Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-53770 PoC — Microsoft SharePoint Server Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)
Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Description
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770
Readme
# CVE-2025-53770-Checker
Comprueba si un servidor SharePoint on-premises es vulnerable a CVE-2025-53770

**Detector no intrusivo** de la vulnerabilidad CVE-2025-53770 en SharePoint Server  
Desarrollo: Division81 (equipo de hackers éticos de Grupo Oruss)

## Descripción técnica

- **CVE-2025-53770** es un fallo crítico de deserialización de .NET en el gestor de ViewState de SharePoint on-premises que permite RCE sin autenticación :contentReference[oaicite:1]{index=1}.
- El exploit emplea un POST a `/ _layouts/15/ToolPane.aspx?DisplayMode=Edit` con payloads de ViewState maliciosos (firmados) que desatan `SerializationException` y suelen escribir web shells (`spinstall0.aspx`) en la carpeta LAYOUTS :contentReference[oaicite:2]{index=2}.
- Parte de la “ToolShell” exploit chain junto a CVE-2025-49706 y CVE-2025-49704, utilizada en campañas APT recientes :contentReference[oaicite:3]{index=3}.

## Requisitos

- Python ≥ 3.7  
- Módulo `requests` (`pip install requests`)

## Uso

git clone https://github.com/tu-org/division81-sp-checker.git
cd division81-sp-checker
pip install -r requirements.txt
python check_sp_cve2025_53770.py https://sharepoint.local/ -e 2019


## Referencias

MSRC Blog: Customer guidance for SharePoint vulnerability CVE-2025-53770
https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/

## Licencia

**MIT © Grupo Oruss – Division81**

File Snapshot

[4.0K] /data/pocs/5a3c07b771f4779825c7ea4b6f84086be56a3b1e ├── [4.2K] checker CVE-2025-53770.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →