# Hoverfly 中间件远程代码执行漏洞
N/A
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Hoverfly versions 1.11.3 and below are vulnerable to remote code execution (RCE) via command injection in the middleware API endpoint (/api/v2/hoverfly/middleware). Insufficient validation of the 'binary' and 'script' parameters allows an unauthenticated attacker to execute arbitrary commands on the host system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-54123.yaml | POC详情 |
标题: remote code execution at `/api/v2/hoverfly/middleware` endpoint due to insecure middleware implementation · Advisory · SpectoLabs/hoverfly · GitHub -- 🔗来源链接
标签: x_refsource_CONFIRM
神龙速读标题: hoverfly/core/hoverfly_service.go at master · SpectoLabs/hoverfly · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: hoverfly/core/middleware/middleware.go at master · SpectoLabs/hoverfly · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: Disabled set middleware api by default · SpectoLabs/hoverfly@17e60a9 · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: Update docs around security implication for exposing set middleware API · SpectoLabs/hoverfly@a9d4da7 · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: hoverfly/core/middleware/local_middleware.go at master · SpectoLabs/hoverfly · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读暂无评论