POC详情: 769cc7a7ed4b53c5f74b729df0fd4b1e2cef6dcd

来源
关联漏洞
标题: Microsoft SharePoint Server 安全漏洞 (CVE-2025-53770)
描述:Microsoft SharePoint Server是美国微软(Microsoft)公司的一款协作平台。 Microsoft SharePoint Server存在安全漏洞,该漏洞源于反序列化不受信任数据,可能导致远程代码执行。
介绍

# 🔐 Bluefire Redteam – SharePoint CVE-2025-53770 Detection & Remediation Toolkit

This open-source toolkit provides security teams with battle-tested scripts to detect, assess, and remediate the critical SharePoint zero-day vulnerability **CVE-2025-53770 (CVSS 9.8)** — currently being exploited in the wild.

> Maintained by [Bluefire Redteam](https://bluefire-redteam.com), a global offensive security firm.

---

## ⚠️ About CVE-2025-53770

- **Vulnerability**: Deserialization of untrusted data in on-prem SharePoint Server
- **Impact**: Unauthenticated Remote Code Execution (RCE), MachineKey theft, persistent compromise
- **Affected**: SharePoint Server 2016, 2019, Subscription Edition
- **Not affected**: SharePoint Online (Microsoft 365)

Once exploited, attackers can:
- Execute code before login
- Steal ASP.NET MachineKeys
- Forge trusted __VIEWSTATE payloads
- Remain persistent even after patching


## 💡 Why Use This Toolkit If Microsoft Already Released a Patch?
While Microsoft provides security updates and mitigation guidance, many organizations still struggle with operationalizing those instructions. This toolkit from Bluefire Redteam automates the detection of vulnerable SharePoint builds, verifies patch status, scans for indicators of compromise (IoCs), and performs critical actions like enabling AMSI and rotating MachineKeys — steps that Microsoft recommends but does not automate. It’s designed to help security teams quickly assess and harden their environments with minimal effort and zero guesswork, especially in large or hybrid deployments.


---

## ⚠️ Modification Disclaimer

This repository is maintained by Bluefire Redteam for informational and operational use only.

> ❗ Please **do not fork, modify, or create derivative scripts under this repository**.

If you need a custom version, contact our team directly via [bluefire-redteam.com/contact](https://bluefire-redteam.com/contact). Unauthorized modifications may introduce security risks and are not supported by Bluefire Redteam.


📄 [Executive CISO Briefing →](./docs/ciso-briefing.md)  
⚙️ [Generate Local CISO Report →](./scripts/generate-ciso-report.ps1)


## 🔍 Usage Instructions

### ✅ Step 1: Clone the Repository

```bash
git clone https://github.com/bluefireredteam/bluefire-sharepoint-cve-2025-53770.git
cd bluefire-sharepoint-cve-2025-53770
```

---

### 🧪 Step 2: Run the Detection Script on Windows

```powershell
.\scripts\detect-vulnerability.ps1
```

This script:

* Detects installed SharePoint version and checks if it's vulnerable
* Checks if the latest patches are installed (KB5002754 / KB5002768)
* Verifies if AMSI is enabled
* Scans for known Indicators of Compromise (e.g., `spinstall0.aspx`, encoded PowerShell, suspicious w3wp.exe behavior)

---

### 🛡️ Step 3: Run the Remediation Script (If Vulnerable)

```powershell
.\scripts\remediate-vulnerability.ps1
```

This script:

* Verifies patch presence
* Enables Antimalware Scan Interface (AMSI)
* Rotates SharePoint ASP.NET MachineKeys
* Restarts IIS services

---

### 🐧 Step 4: Run the Linux Hybrid Scan (Optional)

```bash
bash ./scripts/hybrid-ioc-scan.sh
```

Useful for:

* Reverse proxies, DMZ servers, or shared Linux environments connected to vulnerable SharePoint instances
* Scanning for dropped payloads, encoded PowerShell, or lateral movement behavior




## 🙋‍♂️ Support / Consulting

Need help analyzing your environment or running this toolkit at scale?

🔗 [Contact Bluefire Redteam](https://bluefire-redteam.com/contact)

---

## 📄 License

This project is licensed under the [MIT License](./LICENSE).

---

## ⭐️ Why This Matters

SharePoint sits at the core of many enterprise intranets, workflows, and DevOps pipelines. CVE-2025-53770 allows unauthenticated attackers to take full control of these environments with minimal friction. This toolkit gives defenders a reliable first line of defense — backed by a red team’s real-world testing.

文件快照

[4.0K] /data/pocs/769cc7a7ed4b53c5f74b729df0fd4b1e2cef6dcd ├── [4.0K] docs │   └── [3.2K] ciso-briefing.md ├── [1.3K] LICENSE ├── [3.9K] README.md └── [4.0K] scripts ├── [2.8K] detect-vulnerability.ps1 ├── [1.7K] generate-ciso-report.ps1 ├── [ 826] hybrid-ioc-scan.sh └── [1.1K] remediate-vulnerability.ps1 2 directories, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。