@@ -179526,6 +179526,81 @@
179526
179526
"session_types": false,
179527
179527
"needs_cleanup": null
179528
179528
},
179529
+ "exploit_windows/http/sharepoint_toolpane_rce": {
179530
+ "name": "Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)",
179531
+ "fullname": "exploit/windows/http/sharepoint_toolpane_rce",
179532
+ "aliases": [],
179533
+ "rank": 600,
179534
+ "disclosure_date": "2025-07-08",
179535
+ "type": "exploit",
179536
+ "author": [
179537
+ "Viettel Cyber Security",
179538
+ "sfewer-r7"
179539
+ ],
179540
+ "description": "This module exploits the authentication bypass vulnerabilities CVE-2025-49706 and CVE-2025-53771, and an unsafe\n deserialization vulnerability CVE-2025-49704, to achieve unauthenticated RCE against a vulnerable Microsoft\n SharePoint Server. The vulnerability CVE-2025-53770 was disclosed as being a patch bypass of CVE-2025-49704,\n and as described by the finders, CVE-2025-53770 targets a different endpoint within the /_vti_bin/ URI path.\n As this exploit module does not target the endpoint associated with CVE-2025-53770 (per the original finders),\n we believe this module is best described as exploiting CVE-2025-49704 and not CVE-2025-53770.",
179541
+ "references": [
179542
+ "CVE-2025-49704",
179543
+ "CVE-2025-49706",
179544
+ "CVE-2025-53770",
179545
+ "CVE-2025-53771",
179546
+ "URL-https://blog.viettelcybersecurity.com/sharepoint-toolshell/",
179547
+ "URL-https://blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/",
179548
+ "URL-https://securelist.com/toolshell-explained/",
179549
+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-25-580/",
179550
+ "URL-https://www.zerodayinitiative.com/advisories/ZDI-25-581/",
179551
+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704",
179552
+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706",
179553
+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770",
179554
+ "URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
179555
+ "URL-https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/",
179556
+ "URL-https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/",
179557
+ "URL-https://gist.github.com/gboddin/6374c04f84b58cef050f5f4ecf43d501",
179558
+ "URL-https://x.com/codewhitesec/status/1944743478350557232",
179559
+ "URL-https://x.com/thezdi/status/1923317597673533552",
179560
+ "URL-https://srcincite.io/blog/2020/07/20/sharepoint-and-pwn-remote-code-execution-against-sharepoint-server-abusing-dataset.html"
179561
+ ],
179562
+ "platform": "Windows",
179563
+ "arch": "cmd",
179564
+ "rport": 80,
179565
+ "autofilter_ports": [
179566
+ 80,
179567
+ 8080,
179568
+ 443,
179569
+ 8000,
179570
+ 8888,
179571
+ 8880,
179572
+ 8008,
179573
+ 3000,
179574
+ 8443
179575
+ ],
179576
+ "autofilter_services": [
179577
+ "http",
179578
+ "https"
179579
+ ],
179580
+ "targets": [
179581
+ "Default"
179582
+ ],
179583
+ "mod_time": "2025-08-06 15:33:57 +0000",
179584
+ "path": "/modules/exploits/windows/http/sharepoint_toolpane_rce.rb",
179585
+ "is_install_path": true,
179586
+ "ref_name": "windows/http/sharepoint_toolpane_rce",
179587
+ "check": true,
179588
+ "post_auth": false,
179589
+ "default_credential": false,
179590
+ "notes": {
179591
+ "Stability": [
179592
+ "crash-safe"
179593
+ ],
179594
+ "Reliability": [
179595
+ "repeatable-session"
179596
+ ],
179597
+ "SideEffects": [
179598
+ "ioc-in-logs"
179599
+ ]
179600
+ },
179601
+ "session_types": false,
179602
+ "needs_cleanup": null
179603
+ },
179529
179604
"exploit_windows/http/sharepoint_unsafe_control": {
179530
179605
"name": "Microsoft SharePoint Unsafe Control and ViewState RCE",
179531
179606
"fullname": "exploit/windows/http/sharepoint_unsafe_control",
0 commit comments