# N/A
## 概述
Fortinet FortiWeb 版本 7.6.0 到 7.6.3,7.4.0 到 7.4.7,7.2.0 到 7.2.10 和低于 7.0.10 的版本中存在 SQL 注入漏洞。未经身份验证的攻击者可以通过精心构造的 HTTP 或 HTTPS 请求执行未经授权的 SQL 代码或命令。
## 影响版本
- 7.6.0 到 7.6.3
- 7.4.0 到 7.4.7
- 7.2.0 到 7.2.10
- 低于 7.0.10
## 细节
该漏洞源于对用于 SQL 命令中的特殊元素的不当中和,导致 SQL 注入漏洞 [CWE-89]。攻击者可以通过构造特定的 HTTP 或 HTTPS 请求来利用此漏洞,执行任意 SQL 代码或命令。
## 影响
未经身份验证的攻击者可以利用此漏洞执行未经授权的 SQL 代码或命令,从而可能对系统造成严重威胁。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257 | POC详情 |
2 | FortiWeb CVE-2025-25257 exploit | https://github.com/0xbigshaq/CVE-2025-25257 | POC详情 |
3 | Tool for detecting and exploiting CVE-2025-25257 in Fortinet FortiWeb. | https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool | POC详情 |
4 | None | https://github.com/imbas007/CVE-2025-25257 | POC详情 |
5 | CVE-2025-25257 | https://github.com/B1ack4sh/Blackash-CVE-2025-25257 | POC详情 |
6 | PoC for CVE-2025-25257, a critical unauthenticated SQL injection in FortiWeb. Exploits SQLi via the Authorization header to write a webshell and gain RCE. No login required. Fully automated. | https://github.com/0xgh057r3c0n/CVE-2025-25257 | POC详情 |
7 | Exploiting the CVE-2025-25257 vulnerability in FortiWeb. This repository demonstrates secure pre-authenticated SQL injection. | https://github.com/aitorfirm/CVE-2025-25257 | POC详情 |
8 | CVE‑2025‑25257 is a critical pre-authentication SQL injection vulnerability affecting Fortinet FortiWeb’s | https://github.com/mrmtwoj/CVE-2025-25257 | POC详情 |
9 | Public PoC for CVE-2025-25257: FortiWeb pre-auth SQLi to RCE | https://github.com/TheStingR/CVE-2025-25257 | POC详情 |
10 | An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiWeb may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-25257.yaml | POC详情 |
暂无评论