TT 脆弱性 Blog

脆弱性情報に関する「個人」の調査・研究のログ

SharePoint (まとめ)

malware-log.hatenablog.com


【概要】

公開日
登録日
CVE番号
NVD
ベンダー
CVSS v3
CWE
脆弱性
KEV
備考
2023/05/09 2023/01/31 CVE-2023-24955 NVD Microsoft
7.2(Microsoft)
CWE-94 コード・インジェクション 2024/03/26
2024/07/09 2024/06/11 CVE-2024-38094 NVD Microsoft
7.2(Microsoft)
CWE-502 信頼できないデータのデシリアライゼーション 2024/10/22 Exploit Code あり
2024/07/09 2024/06/11 CVE-2024-38023 NVD Microsoft
7.2(Microsoft)
CWE-502 信頼できないデータのデシリアライゼーション - Exploit Code あり
2024/07/09 2024/06/11 CVE-2024-38024 NVD Microsoft
7.2(Microsoft)
CWE-502 信頼できないデータのデシリアライゼーション - Exploit Code あり
2025/07/08 2025/06/09 CVE-2025-49704 NVD Microsoft
8.8(Microsoft)
CWE-94 コード・インジェクション 2025/07/22
2025/07/08 2025/06/09 CVE-2025-49706 NVD Microsoft
6.5(Microsoft)
CWE-287 不適切な認証 2025/07/22
2025/07/19 2025/07/09 CVE-2025-53770 NVD Microsoft
9.8(Microsoft)
CWE-502 信頼できないデータのデシリアライゼーション 2025/07/20 SharePoint
2025/07/20 2025/07/09 CVE-2025-53771 NVD Microsoft
6.5(Microsoft)
CWE-20
CWE-22
CWE-707
不適切な入力確認
パス・トラバーサル
不適切な無害化
- SharePoint


【SharePoint 】

◆CVE-2025-49704 (まとめ)
https://vul.hatenadiary.com/entry/49704

◆CVE-2025-49706 (まとめ)
https://vul.hatenadiary.com/entry/CVE-2025-49706

◆CVE-2025-53770 (まとめ)
https://vul.hatenadiary.com/entry/CVE-2025-53770

◆ToolShell (まとめ)
https://vul.hatenadiary.com/entry/ToolShell


【ニュース】

■2024年

◇2024年3月

◆「SharePoint Server」の脆弱性悪用に要警戒 - 米当局が注意喚起 (Security NEXT, 2024/03/27)
https://www.security-next.com/155261
https://vul.hatenadiary.com/entry/2024/03/27/000000


◇2024年10月

◆7月修正の「SharePoint」脆弱性、悪用が発生 - 米政府が注意喚起 (Security NEXT, 2024/10/23)
https://www.security-next.com/163298
https://vul.hatenadiary.com/entry/2024/10/23/000000


■2025年

◇2025年7月

◆Microsoft SharePoint zero-day exploited in RCE attacks, no patch available (BleepingComputer, 2025/07/20 11:40)
[マイクロソフトのSharePointのゼロデイ脆弱性がリモートコード実行(RCE)攻撃に悪用され、パッチは未公開です]
https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/
https://vul.hatenadiary.com/entry/2025/07/20/000000

◆Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (BleepingComputer, 2025/07/21 12:41)
[マイクロソフトは、攻撃で悪用されたSharePointのRCE脆弱性に対処するため、緊急のパッチをリリースしました]
https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/
https://vul.hatenadiary.com/entry/2025/07/21/000000


【Exploit Code】

CVE番号
作者
URL
CVE-2024-38094 testanull https://github.com/testanull/MS-SharePoint-July-Patch-RCE-PoC
CVE-2024-38023 testanull https://github.com/testanull/MS-SharePoint-July-Patch-RCE-PoC
CVE-2024-38024 testanull https://github.com/testanull/MS-SharePoint-July-Patch-RCE-PoC
CVE-2025-53770 kaizensecurity https://github.com/kaizensecurity/CVE-2025-53770


【検索】

■Google

google: SharePoint
google:news: SharePoint
google: site:virustotal.com SharePoint
google: site:github.com SharePoint


■Bing

https://www.bing.com/search?q=SharePoint
https://www.bing.com/news/search?q=SharePoint


■Twitter

https://twitter.com/search?q=%23SharePoint
https://twitter.com/hashtag/SharePoint


■Exploit Code / PoC

https://www.exploit-db.com/search?q=SharePoint
https://attackerkb.com/search?q=SharePoint


【関連まとめ記事】

全体まとめ

◆アプリケーション (まとめ)
https://vul.hatenadiary.com/entry/Application


Copyright (C) 谷川哲司 (Tetsuji Tanigawa) 2006 - 2022