关联漏洞
标题:Microsoft SharePoint 输入验证错误漏洞 (CVE-2019-0604)Description:Microsoft SharePoint是美国微软(Microsoft)公司的一套企业业务协作平台。该平台用于对业务信息进行整合,并能够共享工作、与他人协同工作、组织项目和工作组、搜索人员和信息。 Microsoft SharePoint中存在远程代码执行漏洞,该漏洞源于程序无法检查应用程序包的源标记。攻击者可借助特制的SharePoint应用程序包利用该漏洞执行任意代码。以下版本受到影响:Microsoft SharePoint Enterprise Server 2016,SharePoint Fou
Description
Generate Seralize Payload for CVE-2019-0604 for Sharepoint 2010 SP2 .net 3.5
介绍
# cve-2019-0604-SP2010-netv3.5
Recently, I came across a Sharepoint 2010 SP2 and all the Proof of Concept that I tested didn't work until I realized that
the server was on .net 3.5 which require a different library.
Here is the .dll for .net 3.5. The code came from https://github.com/linhlhq/CVE-2019-0604. It will generate the
serialize payload.
文件快照
[4.0K] /data/pocs/efdb1c172375713e8d3ca5eb6c5a0b680ed4a723
├── [4.0K] cve-2019-0604-SP2010-netv3.5
│ ├── [2.6K] cve-2019-0604-SP2010-netv3.5.csproj
│ ├── [283K] Microsoft.SharePoint.Client.dll
│ ├── [182K] Microsoft.Sharepoint.Client.ServerRuntime.dll
│ ├── [ 16M] Microsoft.SharePoint.dll
│ ├── [4.4M] PresentationFramework.dll
│ ├── [1.2K] Program.cs
│ ├── [4.0K] Properties
│ │ └── [1.4K] AssemblyInfo.cs
│ └── [676K] System.Data.Services.dll
├── [1.2K] cve-2019-0604-SP2010-netv3.5.sln
└── [ 352] README.md
2 directories, 10 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。