Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC β€” Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Description
🎯 Vulnerability scanner for SharePoint servers affected by CVE-2025-53770. Detects unsafe deserialization using ToolPane.aspx with a crafted base64+gzip payload. πŸ›‘οΈ Developed by Ahmed Tamer.
Readme

# πŸ›‘οΈ CVE-2025-53770 SharePoint Vulnerability Scanner

A Python-based tool to detect vulnerable Microsoft SharePoint instances affected by **CVE-2025-53770**, an insecure deserialization vulnerability triggered via the `ToolPane.aspx` endpoint. The scanner sends a crafted, compressed ViewState payload to determine if the target leaks internal serialized objects.

---

## πŸš€ Features

- βœ… Detects SharePoint instances vulnerable to CVE-2025-53770
- βœ… Supports scanning a single target or bulk URLs from a file
- βœ… Uses a safe `Scorecard:ExcelDataSet` test payload
- βœ… Decodes and decompresses reflected base64+gzip ViewState data
- βœ… Minimal dependencies and works with standard tools (`curl`, `base64`, `gzip`)
- βœ… Colored CLI output for easy identification

---

## πŸ“– CVE Details

- **CVE**: CVE-2025-53770
- **Component**: Microsoft SharePoint (`ToolPane.aspx`)
- **Vulnerability Type**: Insecure Deserialization / Unsafe ViewState Reflection
- **Severity**: High – May lead to sensitive data disclosure or remote code execution (RCE)
- **Test Marker**: `IntruderScannerDetectionPayload`, `ExcelDataSet`, `divWaiting`, `ProgressTemplate`, `Scorecard`

---

## πŸ§‘β€πŸ’» Usage

```bash
# Scan a single SharePoint URL
python3 CVE-2025-53770_Scanner.py -u https://target.sharepoint.com

# Scan multiple URLs from a file
python3 CVE-2025-53770_Scanner.py -f targets.txt
````

**Example targets.txt file:**

```
https://intranet.company.com
https://sharepoint.university.edu
https://portal.corporate.net
```

---

## πŸ“¦ Requirements

* Python 3.x
* `curl`, `base64`, `gzip` installed and available in system path
* Python module: `colorama`

Install the Python dependency:

```bash
pip install colorama
```

---

## πŸ” Sample Output

```bash
[>] Scanning: https://vulnerable.sharepoint.com
[VULNERABLE] https://vulnerable.sharepoint.com returned payload marker!
```

---

## πŸ“ License

This project is licensed under the [MIT License](LICENSE).

---

## πŸ‘€ Author

**Ahmed Tamer**
Cybersecurity Researcher | Bug Hunter | Red Teamer

* πŸ’Ό [LinkedIn](https://www.linkedin.com/in/ahmed-tamer-b8977b35a)

---

## ⚠️ Ethical Disclaimer

> This tool is developed for **educational and authorized security testing purposes only**.
> You are **not allowed** to use this tool against systems you do not own or lack explicit permission to test.
> Misuse of this software may result in criminal charges β€” **use responsibly and ethically.**

---

```
```
File Snapshot

[4.0K] /data/pocs/47b5907a1cb5f874f321e7352e61bf4a815b5e87 β”œβ”€β”€ [3.4K] CVE-2025-53770_Scanner.py β”œβ”€β”€ [1.0K] LICENSE └── [2.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’