POC详情: 087d5f6ea15c4623a30a52cbb66b298f40faefbc

来源
关联漏洞
标题: 7-Zip 安全漏洞 (CVE-2025-55188)
描述:7-Zip是7-Zip开源的一个压缩软件。 7-Zip 25.01之前版本存在安全漏洞,该漏洞源于解压时未正确处理符号链接。
描述
7z exploit POC versions prior to 25.01
介绍
# CVE-2025-55188-7z-exploit
---

# 7-Zip Symlink Arbitrary File Write PoC (CVE-2025-55188)

## Description

This proof-of-concept demonstrates **CVE-2025-55188**, a vulnerability in 7-Zip versions prior to **25.01**.
The flaw occurs because 7-Zip does not properly handle **symbolic links** during extraction, allowing a crafted archive to overwrite arbitrary files on the target system.

If a victim extracts a malicious archive, the attacker can:

* Overwrite sensitive files (e.g., `.bashrc`, `~/.ssh/authorized_keys`, configuration files).
* Potentially gain code execution or unauthorized access.

---

## How it Works

1. An attacker creates a symbolic link pointing to a target file outside the extraction directory.
2. The link is added to a tar archive along with a payload file.
3. When the archive is extracted with a vulnerable version of 7-Zip, the symlink is followed, and the payload overwrites the target file.

---

## Requirements

* **7-Zip** version **older than 25.01**.
* Target must extract the archive with `7z x` or a vulnerable extraction tool.
* The extraction location must allow symlink traversal to the intended target file.

---

## Usage

```bash
./exploit.sh <payload-file> <symlink-target> <output-archive>
```

* **payload-file**: File containing the malicious content to write.
* **symlink-target**: Path to the file you want to overwrite (e.g., `../../.ssh/authorized_keys`).
* **output-archive**: Name of the crafted `.7z` archive.

Example:

```bash
./exploit.sh mykey.pub ../../.ssh/authorized_keys exploit.7z
```

---

## Disclaimer

This PoC is provided **for educational and testing purposes only**.
Do not use it on systems you do not own or have explicit permission to test.
Unauthorized use may violate laws and result in criminal or civil penalties.

---
文件快照

[4.0K] /data/pocs/087d5f6ea15c4623a30a52cbb66b298f40faefbc ├── [ 493] exploit.sh └── [1.8K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。