# FreePBX 认证绕过导致SQL注入和RCE
## 概述
FreePBX 是一个开源的基于 Web 的图形用户界面。其 15、16 和 17 版本存在安全漏洞,由于未充分过滤用户输入数据,导致攻击者可在未认证的情况下访问管理员界面,进而执行数据库操作和远程代码执行。
## 影响版本
- FreePBX 15
- FreePBX 16
- FreePBX 17
## 细节
漏洞源于用户提交的数据未正确过滤和验证,使攻击者能够通过构造恶意请求绕过身份验证,访问管理员功能。成功利用此漏洞可导致数据库被任意修改,并实现远程代码执行。
## 影响
- 未认证访问管理员界面
- 任意数据库操作
- 远程代码执行
## 修复版本
- FreePBX 15.0.66
- FreePBX 16.0.89
- FreePBX 17.0.3
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Detection for CVE-2025-57819 | https://github.com/rxerium/CVE-2025-57819 | POC详情 |
| 2 | This is repository contains a script to check for current IOCs listed in the freepbx forum topic of the CVE-2025-57819 | https://github.com/Sucuri-Labs/CVE-2025-57819-ioc-check | POC详情 |
| 3 | FreePBX SQL Injection Exploit | https://github.com/blueisbeautiful/CVE-2025-57819 | POC详情 |
| 4 | A write up of CVE-2025-57819, a vulnerability affecting FreePBX 15, 16, and 17 | https://github.com/net-hex/CVE-2025-57819 | POC详情 |
| 5 | FreePBX CVE-2025-57819 lab (Docker) + Nuclei POC for unauth SQLi (time-based). | https://github.com/ImBIOS/lab-cve-2025-57819 | POC详情 |
| 6 | CVE-2025-57819 | https://github.com/B1ack4sh/Blackash-CVE-2025-57819 | POC详情 |
| 7 | FreePBX backdoor cleanup script used in 0-day exploitation of CVE-2025-57819 was detected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/backdoor/freepbx-cleanup-backdoor.yaml | POC详情 |
| 8 | None | https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819 | POC详情 |
| 9 | FreePBX 15, 16, and 17 contain a remote code execution caused by insufficiently sanitized user-supplied data in endpoints, letting unauthenticated attackers manipulate the database and execute code remotely, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-57819.yaml | POC详情 |
| 10 | FreePBX SQL Injection Exploit | https://github.com/brokendreamsclub/CVE-2025-57819 | POC详情 |
| 11 | FreePBX versions 15, 16, and 17 contain a Remote Code Execution (RCE) vulnerability caused by insufficient sanitization of user-supplied data in endpoints. | https://github.com/MuhammadWaseem29/SQL-Injection-and-RCE_CVE-2025-57819 | POC详情 |
| 12 | Safe, read-only SQL Injection checker for FreePBX (CVE-2025-57819), using error/boolean/time-based techniques with per-parameter verdicts and JSON reporting. | https://github.com/xV4nd3Rx/CVE-2025-57819_FreePBX-PoC | POC详情 |
| 13 | This repository includes two PoC scripts for CVE-2025-57819 in FreePBX: one to create a new admin user (poc_admin.py), and another to extract credentials using sqlmap (poc_auto_get_username_pass.py). For educational and authorized use only. | https://github.com/orange0Mint/CVE-2025-57819_FreePBX | POC详情 |
| 14 | 🔍 Detect SQL injection risks in FreePBX's admin interface safely and efficiently, providing actionable insights and clean JSON reports for security teams. | https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC | POC详情 |
标题: Authentication Bypass Leading to SQL Injection and RCE · Advisory · FreePBX/security-reporting · GitHub -- 🔗来源链接
标签: x_refsource_CONFIRM
神龙速读暂无评论