支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 426fb6de18085174885d137f2dd51d7824c2d4f9

来源
关联漏洞
标题:Scriptcase 安全漏洞 (CVE-2025-47227)
描述:Scriptcase是Scriptcase公司的一种用于快速应用程序开发的低代码平台。 Scriptcase 9.12.006版本存在安全漏洞,该漏洞源于管理员密码重置机制处理不当,可能导致认证绕过。
描述
CVE-2025-47227
介绍
# 🔓 CVE-2025-47227 — Critical Admin Password Reset Bypass in ScriptCase 🔓

---

### ⚠️ CVE-2025-47227 Overview

* 🛡️ **Type:** Authentication bypass vulnerability
* 🖥️ **Affected software:** Netmake ScriptCase, Production Environment module, versions up to 9.12.006
* 🔓 **Impact:** Allows unauthenticated attackers to reset admin password and gain full access.

---

### 🛠️ Technical Details

* ⚠️ Vulnerability in the password reset mechanism allows bypassing authentication.
* 📩 Attacker sends crafted GET and POST requests to `login.php` to reset admin password.
* 👤 Single admin user makes privilege takeover easy.

---

### 🔗 Exploitation Chain

* 🔥 Can be chained with CVE-2025-47228 (shell injection) for remote command execution (RCE).
* Steps:

  1. 🔑 Reset admin password via the flaw.
  2. 🔓 Log in with new credentials.
  3. 💻 Execute arbitrary commands via shell injection.

---

### 📊 Severity (CVSS v3.1)

* ⚠️ **Base Score:** 7.5 (High)
* 🌐 **Attack Vector:** Network
* 🎯 **Complexity:** Low
* 🙅 **Privileges:** None required
* 👥 **User Interaction:** None
* 🔄 **Scope:** Unchanged
* 🔐 **Confidentiality:** None
* 🛠️ **Integrity:** High impact
* 🚫 **Availability:** None

---

### 🛡️ Mitigation Recommendations

* 🔄 Update ScriptCase to latest patched version.
* 🚧 Restrict access to key scripts (`login.php`, etc.) with firewalls or proxies.
* 🚫 Avoid unsafe system commands using user input.
* 🎫 Implement stronger CAPTCHA protection.
* 📜 Monitor logs for suspicious activity regularly.

---

### 🛠️ Usage

An exploitation script was written to handle several scenarios:

+ Perform the pre-authentication remote command execution by chaining the two vulnerabilities (password reset and authenticated command execution)
+ Only perform the password reset
+ Only perform authenticated command execution
+ Detect the deployment path

```
Usage:
  Examples:

  Pre-Auth RCE (password reset + RCE)
    python exploit.py -u http://example.org/scriptcase -c "command"
  Password reset only (no auth)
    python exploit.py -u http://example.org/scriptcase
  RCE only (need account)
    python exploit.py -u http://example.org/scriptcase -c "command" -p 'Password123*'
  Detect deployment path
    python exploit.py -u http://example.org/ -d


Options:
  -h, --help            show this help message and exit
  -u BASE_URL, --base-url=BASE_URL
  -c COMMAND, --command=COMMAND
  -p PASSWORD, --password=PASSWORD
  -d, --detect
```

---


### ⚠️ Disclaimer:

The information provided about CVE-2025-47227 is for educational and security awareness purposes only. Exploiting vulnerabilities without proper authorization is illegal and unethical. Always ensure you have explicit permission before testing or attempting to exploit any system. Use this knowledge responsibly to help improve security and protect systems. The author or distributor of this information is not liable for any misuse or damage caused.
文件快照

[4.0K] /data/pocs/426fb6de18085174885d137f2dd51d7824c2d4f9 ├── [ 13K] CVE-2025-47227.py └── [3.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。