Associated Vulnerability
Title:Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2025-53770)Description:Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Readme
# π Bluefire Redteam β SharePoint CVE-2025-53770 Detection & Remediation Toolkit
This open-source toolkit provides security teams with battle-tested scripts to detect, assess, and remediate the critical SharePoint zero-day vulnerability **CVE-2025-53770 (CVSS 9.8)** β currently being exploited in the wild.
> Maintained by [Bluefire Redteam](https://bluefire-redteam.com), a global offensive security firm.
---
## β οΈ About CVE-2025-53770
- **Vulnerability**: Deserialization of untrusted data in on-prem SharePoint Server
- **Impact**: Unauthenticated Remote Code Execution (RCE), MachineKey theft, persistent compromise
- **Affected**: SharePoint Server 2016, 2019, Subscription Edition
- **Not affected**: SharePoint Online (Microsoft 365)
Once exploited, attackers can:
- Execute code before login
- Steal ASP.NET MachineKeys
- Forge trusted __VIEWSTATE payloads
- Remain persistent even after patching
## π‘ Why Use This Toolkit If Microsoft Already Released a Patch?
While Microsoft provides security updates and mitigation guidance, many organizations still struggle with operationalizing those instructions. This toolkit from Bluefire Redteam automates the detection of vulnerable SharePoint builds, verifies patch status, scans for indicators of compromise (IoCs), and performs critical actions like enabling AMSI and rotating MachineKeys β steps that Microsoft recommends but does not automate. Itβs designed to help security teams quickly assess and harden their environments with minimal effort and zero guesswork, especially in large or hybrid deployments.
---
## β οΈ Modification Disclaimer
This repository is maintained by Bluefire Redteam for informational and operational use only.
> β Please **do not fork, modify, or create derivative scripts under this repository**.
If you need a custom version, contact our team directly via [bluefire-redteam.com/contact](https://bluefire-redteam.com/contact). Unauthorized modifications may introduce security risks and are not supported by Bluefire Redteam.
π [Executive CISO Briefing β](./docs/ciso-briefing.md)
βοΈ [Generate Local CISO Report β](./scripts/generate-ciso-report.ps1)
## π Usage Instructions
### β
Step 1: Clone the Repository
```bash
git clone https://github.com/bluefireredteam/bluefire-sharepoint-cve-2025-53770.git
cd bluefire-sharepoint-cve-2025-53770
```
---
### π§ͺ Step 2: Run the Detection Script on Windows
```powershell
.\scripts\detect-vulnerability.ps1
```
This script:
* Detects installed SharePoint version and checks if it's vulnerable
* Checks if the latest patches are installed (KB5002754 / KB5002768)
* Verifies if AMSI is enabled
* Scans for known Indicators of Compromise (e.g., `spinstall0.aspx`, encoded PowerShell, suspicious w3wp.exe behavior)
---
### π‘οΈ Step 3: Run the Remediation Script (If Vulnerable)
```powershell
.\scripts\remediate-vulnerability.ps1
```
This script:
* Verifies patch presence
* Enables Antimalware Scan Interface (AMSI)
* Rotates SharePoint ASP.NET MachineKeys
* Restarts IIS services
---
### π§ Step 4: Run the Linux Hybrid Scan (Optional)
```bash
bash ./scripts/hybrid-ioc-scan.sh
```
Useful for:
* Reverse proxies, DMZ servers, or shared Linux environments connected to vulnerable SharePoint instances
* Scanning for dropped payloads, encoded PowerShell, or lateral movement behavior
## πββοΈ Support / Consulting
Need help analyzing your environment or running this toolkit at scale?
π [Contact Bluefire Redteam](https://bluefire-redteam.com/contact)
---
## π License
This project is licensed under the [MIT License](./LICENSE).
---
## βοΈ Why This Matters
SharePoint sits at the core of many enterprise intranets, workflows, and DevOps pipelines. CVE-2025-53770 allows unauthenticated attackers to take full control of these environments with minimal friction. This toolkit gives defenders a reliable first line of defense β backed by a red teamβs real-world testing.
File Snapshot
[4.0K] /data/pocs/769cc7a7ed4b53c5f74b729df0fd4b1e2cef6dcd
βββ [4.0K] docs
βΒ Β βββ [3.2K] ciso-briefing.md
βββ [1.3K] LICENSE
βββ [3.9K] README.md
βββ [4.0K] scripts
βββ [2.8K] detect-vulnerability.ps1
βββ [1.7K] generate-ciso-report.ps1
βββ [ 826] hybrid-ioc-scan.sh
βββ [1.1K] remediate-vulnerability.ps1
2 directories, 7 files
Remarks
1. It is advised to access via the original source first.
2. Local POC snapshots are reserved for subscribers β if the original source is unavailable, the local mirror is part of the paid plan.
3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β thank you for the support. View subscription plans β