POC详情: cc933c3bca252670b9ca9ec75b6824c8dfdd25bd

来源
关联漏洞
标题: Microsoft Scripting Engine 安全漏洞 (CVE-2025-30397)
描述:Microsoft Scripting Engine是美国微软(Microsoft)公司的一种工具,为JScript和VBScript提供脚本引擎。 Microsoft Scripting Engine存在安全漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for
描述
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
介绍
# CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)


 🧠 Description

This repository contains a proof-of-concept (PoC) exploit for a Use-After-Free vulnerability in the JScript engine (`jscript.dll`) affecting Windows Server 2025 (build 25398 and prior). The vulnerability allows remote code execution by exploiting memory corruption through heap spraying techniques. The PoC demonstrates execution of `calc.exe` via Internet Explorer 11 on the affected system.

---

 🔍 CVE Details

- CVE ID: [CVE-2025-30397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30397)
- Vendor: Microsoft
- Affected Platforms: Windows Server 2025 (build 25398 and prior)
- Tested On: Windows Server 2025 + Internet Explorer 11 (x86)
- Vulnerability Type: Use-After-Free in `jscript.dll`
- Impact: Remote Code Execution (RCE)
- Severity: Critical



⚙️ Technical Summary

This PoC exploits a Use-After-Free bug caused by improper management of object references in the legacy JScript engine. When triggered via a specially crafted HTML page, the vulnerability allows attackers to corrupt memory and achieve remote code execution. The exploit uses heap spraying to place shellcode in memory, ultimately executing calc.exe on vulnerable systems running Windows Server 2025 with Internet Explorer 11. This demonstrates the impact of the flaw and confirms exploitability under real conditions.

Author

Mohammed Idrees Banyamer
文件快照

[4.0K] /data/pocs/cc933c3bca252670b9ca9ec75b6824c8dfdd25bd ├── [4.3K] exploit.py ├── [ 34K] LICENSE └── [1.5K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。