4.9 • 696 Ratings
🗓️ 22 July 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, July 22nd, 2025 edition of the Sands Internet Storm Center's Stormcast. My name is Johannes Ulrich, recording today from Jacksonville, Florida. And this episode is brought you by the sands.edu master's degree program in information security engineering. |
0:24.4 | And of course, well, SharePoint, let's start with that. |
0:29.1 | Microsoft has some nice updates about this particular problem. |
0:34.4 | And there are patches available now if you're using the SharePoint Server subscription edition or SharePoint server 2019. |
0:38.4 | For 2016, at this point, there are no updates available yet, but you are vulnerable. |
0:46.2 | So assume compromise at this point. |
0:49.1 | There are plenty of working exploits that have been made public for this particular vulnerability. |
0:55.8 | Also, don't be too specific in your detection rules on the payload. |
1:01.2 | Payloads can easily be generated using the dot-net version of WISO serial, |
1:06.8 | a common tool to exploit deseralsation attacks in dot-net. |
1:12.8 | There are also now two CVEs at 2025, 53-770, and then 53-771. |
1:23.1 | The first CVE is for the deserilization vulnerability. |
1:28.1 | The second CVE, the 71 CVE, is for the authentication bypass problem. |
1:34.9 | So we are back to two vulnerabilities here, but note, it only takes one request to exploit them all. |
1:41.4 | In order to exploit this vulnerability, you essentially first set the referrer header |
1:47.9 | to the sign-out page for the SharePoint instance, and that's, well, the same across |
1:53.7 | different versions. |
1:55.8 | And then you basically just include the dot-net desereralization payload as a payload to the post request. |
2:04.9 | Again, assume compromise when you're patching this vulnerability. |
2:09.4 | We'll have a bit more guidance and such probably over the next couple days as I'm able to pull a couple more details together. |
2:16.8 | Just the gut setting up SharePoint server to be able to pull a couple more details together, just the gut setting up SharePoint server |
2:19.9 | to be able to play with this vulnerability in the patch to see how well it works and if it |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.