Skip to content

zach115th/ToolShellFinder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🛠️ ToolShellFinder: CVE-2025-53770 & CVE-2025-53771 Detection

A high-performance PowerShell 7+ script for scanning IIS logs to detect signs of exploitation related to ToolShell, specifically targeting the zero-day vulnerabilities CVE-2025-53770 and CVE-2025-53771 in Microsoft SharePoint.

This script is hacked together to help DFIR teams, sysadmins, and security professionals identify suspicious activity associated with these vulnerabilities in SharePoint environments and is ideal for defenders who prefer native PowerShell.

Version PS5 is being replaced by version PS7

📘 Table of Contents


⚠️ Background

CVE-2025-53770 and CVE-2025-53771 are recently disclosed vulnerabilities affecting Microsoft SharePoint, potentially allowing remote code execution and exploitation via crafted requests to /ToolPane.aspx, suspicious uploads, or exploitation of ViewState parameters. Attackers may leave forensic traces in IIS logs.


📌 Key Features

  • 🔍 Scans IIS W3C logs recursively from a given root directory.
  • 🧠 Detects:
    • ToolPane abuse (ToolPane.aspx exploitation)
    • Suspicious file accesses (e.g. spinstall.aspx, ghostfile.aspx, etc.)
    • Requests from known malicious IPs (via external blocklist)
  • ⚙️ Fully parallelized using ForEach-Object -Parallel for speed.
  • 🧾 Outputs CSV results for DFIR reporting or SIEM ingestion.

💻 Requirements

  • PowerShell 7.0 or newer
  • Admin/Read access to IIS log files
  • Internet access to retrieve remote IP blocklist (optional)

🚀 How to Use

  1. Edit the top of the script:

     $logRoot       = "C:\inetpub\logs\LogFiles"  # Your log folder
     $ThrottleLimit = 12                          # Number of parallel threads
  2. Run the script:

    .\toolshellfinderPS7.ps1
  3. Results will be saved to:

    IIS_IoC_Matches.csv

📌 Detection Logic

✅ IoC Set 1 — CVE-2025-53771 (ToolPane abuse)

  • POST or GET to:
    /_layouts/15/ToolPane.aspx
     /_layouts/16/ToolPane.aspx
  • With query:
    DisplayMode=Edit&a=/ToolPane.aspx
  • And referer:
    /_layouts/SignOut.aspx or "-"

✅ IoC Set 2 — CVE-2025-53770 (Suspicious file names)

  • Access to files matching:
    spinstall.aspx, spinstall*.aspx, ghostfile.aspx, debug_dev.js,
    info.js, machinekey.aspx, ghost.aspx, etc.
  • Located under:
    /_layouts/15/
    /_layouts/16/
  • With referer:
    /SignOut.aspx or -

✅ IoC Set 3 — Malicious IP addresses

  • The script dynamically downloads a threat intel list from:
    https://raw.githubusercontent.com/zach115th/BlockLists/main/emerging-threats/2025/toolshell/toolshell_ips.txt

📎 References


✅ Summary

ToolShellFinder is a fast, flexible, and battle-tested PowerShell script for detecting real-world exploitation of SharePoint zero-days via log review. Use it in your DFIR toolkit to catch what your EDR may have missed.


About

Scans Windows IIS logs for signs of CVE-2025-53770 & CVE-2025-53771

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

 
 
 

Contributors