关联漏洞
描述
Proof-of-Concept (PoC) for CVE-2025-29306, a Remote Code Execution vulnerability in FoxCMS. This Python script scans single or multiple targets, executes commands, and reports vulnerable hosts.
介绍
# CVE-2025-29306 - FoxCMS Remote Code Execution Exploit


A Python exploit for CVE-2025-29306, a remote code execution vulnerability in FoxCMS. This tool allows testing single targets or scanning multiple hosts in bulk.
## Features
- Single target or bulk scanning capability
- Multi-threaded for fast scanning
- Detailed output with command execution results
- Automatic results saving to file
- Real-time progress reporting
- Clean summary table of vulnerable hosts
## Installation
```bash
git clone https://github.com/mattb709/CVE-2025-29306-PoC-FoxCMS-RCE
.git
cd CVE-2025-29306-PoC-FoxCMS-RCE
pip install -r requirements.txt
```
## Requirements
- Python 3.6+
- Required packages:
- `requests`
- `beautifulsoup4`
- `argparse`
Install requirements with:
```bash
pip install requests beautifulsoup4
```
## Usage
```
usage: foxcms_rce.py [-h] -c COMMAND (-t TARGET | -f TARGETS_FILE)
CVE-2025-29306 Exploit Checker
options:
-h, --help show this help message and exit
-c COMMAND, --command COMMAND
Command to execute on vulnerable hosts
-t TARGET, --target TARGET
Single target in the format ip:port
-f TARGETS_FILE, --targets-file TARGETS_FILE
File containing multiple targets, one per line, in the format ip:port
```
### Examples
1. Test a single target:
```bash
python CVE-2025-29306-PoC -t 192.168.1.100:8080 -c "whoami"
```
2. Scan multiple targets from a file:
```bash
python CVE-2025-29306-PoC -f targets.txt -c "whoami"
```
3. Save output to file (automatically done):
```bash
python CVE-2025-29306-PoC -f targets.txt -c "whoami" > results.txt
```
## Target File Format
The targets file should contain one target per line in the format:
```
ip:port
```
Example:
```
192.168.1.100:80
10.10.10.5:443
172.16.32.15:8080
```
## Output
The script provides:
- Real-time progress with status for each target
- Detailed output for vulnerable hosts
- Summary table of all vulnerable hosts
- Automatic saving of full results to `foxcms_rce_results.txt`

## Disclaimer
This tool is for educational and authorized testing purposes only. The author is not responsible for any misuse or damage caused by this program.
## License
MIT License - See LICENSE file for details
文件快照
[4.0K] /data/pocs/55d1ae5d2286c4d278d233617cbf2397e9187c63
├── [5.0K] CVE-2025-29306-PoC.py
├── [1.0K] LICENSE
├── [2.5K] README.md
└── [ 40] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。