@@ -179526,6 +179526,81 @@
179526179526 "session_types": false,
179527179527 "needs_cleanup": null
179528179528 },
179529+ "exploit_windows/http/sharepoint_toolpane_rce": {
179530+ "name": "Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)",
179531+ "fullname": "exploit/windows/http/sharepoint_toolpane_rce",
179532+ "aliases": [],
179533+ "rank": 600,
179534+ "disclosure_date": "2025-07-08",
179535+ "type": "exploit",
179536+ "author": [
179537+ "Viettel Cyber Security",
179538+ "sfewer-r7"
179539+ ],
179540+ "description": "This module exploits the authentication bypass vulnerabilities CVE-2025-49706 and CVE-2025-53771, and an unsafe\n deserialization vulnerability CVE-2025-49704, to achieve unauthenticated RCE against a vulnerable Microsoft\n SharePoint Server. The vulnerability CVE-2025-53770 was disclosed as being a patch bypass of CVE-2025-49704,\n and as described by the finders, CVE-2025-53770 targets a different endpoint within the /_vti_bin/ URI path.\n As this exploit module does not target the endpoint associated with CVE-2025-53770 (per the original finders),\n we believe this module is best described as exploiting CVE-2025-49704 and not CVE-2025-53770.",
179541+ "references": [
179542+ "CVE-2025-49704",
179543+ "CVE-2025-49706",
179544+ "CVE-2025-53770",
179545+ "CVE-2025-53771",
179546+ "URL-https://blog.viettelcybersecurity.com/sharepoint-toolshell/",
179547+ "URL-https://blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/",
179548+ "URL-https://securelist.com/toolshell-explained/",
179549+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-25-580/",
179550+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-25-581/",
179551+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704",
179552+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706",
179553+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770",
179554+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
179555+ "URL-https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/",
179556+ "URL-https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/",
179557+ "URL-https://gist.github.com/gboddin/6374c04f84b58cef050f5f4ecf43d501",
179558+ "URL-https://x.com/codewhitesec/status/1944743478350557232",
179559+ "URL-https://x.com/thezdi/status/1923317597673533552",
179560+ "URL-https://srcincite.io/blog/2020/07/20/sharepoint-and-pwn-remote-code-execution-against-sharepoint-server-abusing-dataset.html"
179561+ ],
179562+ "platform": "Windows",
179563+ "arch": "cmd",
179564+ "rport": 80,
179565+ "autofilter_ports": [
179566+ 80,
179567+ 8080,
179568+ 443,
179569+ 8000,
179570+ 8888,
179571+ 8880,
179572+ 8008,
179573+ 3000,
179574+ 8443
179575+ ],
179576+ "autofilter_services": [
179577+ "http",
179578+ "https"
179579+ ],
179580+ "targets": [
179581+ "Default"
179582+ ],
179583+ "mod_time": "2025-08-06 15:33:57 +0000",
179584+ "path": "/modules/exploits/windows/http/sharepoint_toolpane_rce.rb",
179585+ "is_install_path": true,
179586+ "ref_name": "windows/http/sharepoint_toolpane_rce",
179587+ "check": true,
179588+ "post_auth": false,
179589+ "default_credential": false,
179590+ "notes": {
179591+ "Stability": [
179592+ "crash-safe"
179593+ ],
179594+ "Reliability": [
179595+ "repeatable-session"
179596+ ],
179597+ "SideEffects": [
179598+ "ioc-in-logs"
179599+ ]
179600+ },
179601+ "session_types": false,
179602+ "needs_cleanup": null
179603+ },
179529179604 "exploit_windows/http/sharepoint_unsafe_control": {
179530179605 "name": "Microsoft SharePoint Unsafe Control and ViewState RCE",
179531179606 "fullname": "exploit/windows/http/sharepoint_unsafe_control",
0 commit comments