Skip to content

Commit 41698af

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent b6dc086 commit 41698af

File tree

1 file changed

+75
-0
lines changed

1 file changed

+75
-0
lines changed

db/modules_metadata_base.json

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179526,6 +179526,81 @@
179526179526
"session_types": false,
179527179527
"needs_cleanup": null
179528179528
},
179529+
"exploit_windows/http/sharepoint_toolpane_rce": {
179530+
"name": "Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell)",
179531+
"fullname": "exploit/windows/http/sharepoint_toolpane_rce",
179532+
"aliases": [],
179533+
"rank": 600,
179534+
"disclosure_date": "2025-07-08",
179535+
"type": "exploit",
179536+
"author": [
179537+
"Viettel Cyber Security",
179538+
"sfewer-r7"
179539+
],
179540+
"description": "This module exploits the authentication bypass vulnerabilities CVE-2025-49706 and CVE-2025-53771, and an unsafe\n deserialization vulnerability CVE-2025-49704, to achieve unauthenticated RCE against a vulnerable Microsoft\n SharePoint Server. The vulnerability CVE-2025-53770 was disclosed as being a patch bypass of CVE-2025-49704,\n and as described by the finders, CVE-2025-53770 targets a different endpoint within the /_vti_bin/ URI path.\n As this exploit module does not target the endpoint associated with CVE-2025-53770 (per the original finders),\n we believe this module is best described as exploiting CVE-2025-49704 and not CVE-2025-53770.",
179541+
"references": [
179542+
"CVE-2025-49704",
179543+
"CVE-2025-49706",
179544+
"CVE-2025-53770",
179545+
"CVE-2025-53771",
179546+
"URL-https://blog.viettelcybersecurity.com/sharepoint-toolshell/",
179547+
"URL-https://blog.leakix.net/2025/07/using-their-own-weapons-for-defense-a-sharepoint-story/",
179548+
"URL-https://securelist.com/toolshell-explained/",
179549+
"URL-https://www.zerodayinitiative.com/advisories/ZDI-25-580/",
179550+
"URL-https://www.zerodayinitiative.com/advisories/ZDI-25-581/",
179551+
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704",
179552+
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706",
179553+
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770",
179554+
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
179555+
"URL-https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/",
179556+
"URL-https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/",
179557+
"URL-https://gist.github.com/gboddin/6374c04f84b58cef050f5f4ecf43d501",
179558+
"URL-https://x.com/codewhitesec/status/1944743478350557232",
179559+
"URL-https://x.com/thezdi/status/1923317597673533552",
179560+
"URL-https://srcincite.io/blog/2020/07/20/sharepoint-and-pwn-remote-code-execution-against-sharepoint-server-abusing-dataset.html"
179561+
],
179562+
"platform": "Windows",
179563+
"arch": "cmd",
179564+
"rport": 80,
179565+
"autofilter_ports": [
179566+
80,
179567+
8080,
179568+
443,
179569+
8000,
179570+
8888,
179571+
8880,
179572+
8008,
179573+
3000,
179574+
8443
179575+
],
179576+
"autofilter_services": [
179577+
"http",
179578+
"https"
179579+
],
179580+
"targets": [
179581+
"Default"
179582+
],
179583+
"mod_time": "2025-08-06 15:33:57 +0000",
179584+
"path": "/modules/exploits/windows/http/sharepoint_toolpane_rce.rb",
179585+
"is_install_path": true,
179586+
"ref_name": "windows/http/sharepoint_toolpane_rce",
179587+
"check": true,
179588+
"post_auth": false,
179589+
"default_credential": false,
179590+
"notes": {
179591+
"Stability": [
179592+
"crash-safe"
179593+
],
179594+
"Reliability": [
179595+
"repeatable-session"
179596+
],
179597+
"SideEffects": [
179598+
"ioc-in-logs"
179599+
]
179600+
},
179601+
"session_types": false,
179602+
"needs_cleanup": null
179603+
},
179529179604
"exploit_windows/http/sharepoint_unsafe_control": {
179530179605
"name": "Microsoft SharePoint Unsafe Control and ViewState RCE",
179531179606
"fullname": "exploit/windows/http/sharepoint_unsafe_control",

0 commit comments

Comments
 (0)