POC详情: 0a34aabe307d5819e85ed0dc2fc30aca8b68f148

来源
关联漏洞

疑似Oday

描述
The graph functionality of DeimosC2 v1.1.0-Beta is vulnerable to Stored Cross-Site Scripting (XSS), allowing the theft of session cookie and unauthorized access to the C2 server.
介绍
# CVE-2025-26244-POC
The code to exploit this vulnerability can be seen in 'spoof.go'. This imitates as an agent to the C2 server. In order to run this vulnerability we need to know:

1. The listener IP address and Port
2. The public key of the listener.
3. The first time check in URL of the listener.

We could obtain this information by reverse engineering a binary previously generated by the operator.

Currently, 'spoof.go' only works when both the listener and agent use the HTTPS protocol, however, if adapted this will likely work with the other protocols DeimosC2 supports.

## To Exploit
1) You will need access to a HTTPS binary previously generated by the operator. 

2) Extract the IP address, port, the public key and first time check in URL of the listener from the binary. [Trend Micro](https://www.trendmicro.com/en_us/research/22/k/deimosc2-what-soc-analysts-and-incident-responders-need-to-know.html) provide scripts to aid in this.
3) Place the IP address, port, the public key and first time check in URL of the listener into the script.
4) Install the DeimosC2 Crypto Library

```go
go install github.com/DeimosC2/DeimosC2/lib/crypto@latest
```

5) Run the script.
```go
go run Spoof.go
```
6) A new agent will be registered and as soon as the operator loads the graph view the XSS will trigger and you will have their cookie!

*If you only have access to a binary with one of the other protocols, spoof.go will need to be adapted to support the other protocols.*

# Writeup
A full writeup on how I discovered this vulnerability can be seen on my blog [here](https://jarm222.github.io/posts/CVE-2025-26244-Writeup/).

# Video PoC
https://github.com/user-attachments/assets/b6e475b2-600d-40ce-bdfa-5bfe9ff3d682







文件快照

[4.0K] /data/pocs/0a34aabe307d5819e85ed0dc2fc30aca8b68f148 ├── [5.8M] POC.mov ├── [1.7K] README.md └── [3.7K] spoof.go 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。