POC详情: db5a2c5029ef5ea814a212bef8fce9241ed46805

来源
关联漏洞
标题: Microsoft SharePoint Server 安全漏洞 (CVE-2025-53770)
描述:Microsoft SharePoint Server是美国微软(Microsoft)公司的一款协作平台。 Microsoft SharePoint Server存在安全漏洞,该漏洞源于反序列化不受信任数据,可能导致远程代码执行。
介绍
# Pre-Exploit Vulnerability Check for CVE-2025-53770 (with Burp Suite Proxy)

This script checks a list of SharePoint hosts for vulnerability to CVE-2025-53770 using a custom payload and routes all requests through Burp Suite's proxy for interception and analysis.

## Features
- Checks single or multiple targets for CVE-2025-53770.
- Uses a custom payload (from a JSON file).
- Sends requests through Burp Suite proxy (`http://127.0.0.1:8080`).
- Suppresses SSL warnings for clean output.
- Saves all vulnerable hosts to `vulnerable_hosts.txt` after the scan.
- Prints `[VULNERABLE]`, `[SAFE]`, or `[ERROR]` for each target.

## Requirements
- Python 3.7+
- `requests` library (`pip install requests`)
- Burp Suite (optional, for interception)
- `config.json` (scanner config)
- `payload.json` (POST data for the exploit)
- Target list file (e.g., `live_list.txt`)

## Usage

### 1. Prepare Files
- `config.json`: Contains detection rules, endpoints, headers, etc.
- `payload.json`: Contains only the POST data, e.g.:
  ```json
  {
    "MSOTlPn_Uri": "https://{host}/_controltemplates/15/AclEditor.ascx",
    "MSOTlPn_DWP": "<your payload here>"
  }
  ```
- `live_list.txt`: List of targets (one per line, IP or hostname only, no protocol).

### 2. Start Burp Suite (Optional)
- Open Burp Suite and ensure the proxy is listening on `127.0.0.1:8080`.

### 3. Run the Script

**For a list of targets:**
```bash
python3 Vul_Sacnner.py -l live_list.txt --payload payload.json
```

**For a single target:**
```bash
python3 Vul_Sacnner.py -t 1.2.3.4 --payload payload.json
```

After the scan, check `vulnerable_hosts.txt` for the list of vulnerable hosts.
文件快照

[4.0K] /data/pocs/db5a2c5029ef5ea814a212bef8fce9241ed46805 ├── [4.6K] config.json ├── [ 896] payload.json ├── [1.6K] README.md └── [6.3K] Vul_Sacnner.py 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。