POC详情: 55d1ae5d2286c4d278d233617cbf2397e9187c63

来源
关联漏洞
标题: FoxCMS 安全漏洞 (CVE-2025-29306)
描述:FoxCMS是中国黔狐(FoxCMS)公司的一套可免费商用开源的内容管理系统。 FoxCMS 1.2.5版本存在安全漏洞,该漏洞源于index.html组件允许执行任意代码。
描述
Proof-of-Concept (PoC) for CVE-2025-29306, a Remote Code Execution vulnerability in FoxCMS. This Python script scans single or multiple targets, executes commands, and reports vulnerable hosts.
介绍
# CVE-2025-29306 - FoxCMS Remote Code Execution Exploit

![Python Version](https://img.shields.io/badge/python-3.6+-blue.svg)
![License](https://img.shields.io/badge/license-MIT-green.svg)

A Python exploit for CVE-2025-29306, a remote code execution vulnerability in FoxCMS. This tool allows testing single targets or scanning multiple hosts in bulk.

## Features

- Single target or bulk scanning capability
- Multi-threaded for fast scanning
- Detailed output with command execution results
- Automatic results saving to file
- Real-time progress reporting
- Clean summary table of vulnerable hosts

## Installation

```bash
git clone https://github.com/mattb709/CVE-2025-29306-PoC-FoxCMS-RCE
.git
cd CVE-2025-29306-PoC-FoxCMS-RCE
pip install -r requirements.txt
```

## Requirements

- Python 3.6+
- Required packages:
  - `requests`
  - `beautifulsoup4`
  - `argparse`

Install requirements with:
```bash
pip install requests beautifulsoup4
```

## Usage

```
usage: foxcms_rce.py [-h] -c COMMAND (-t TARGET | -f TARGETS_FILE)

CVE-2025-29306 Exploit Checker

options:
  -h, --help            show this help message and exit
  -c COMMAND, --command COMMAND
                        Command to execute on vulnerable hosts
  -t TARGET, --target TARGET
                        Single target in the format ip:port
  -f TARGETS_FILE, --targets-file TARGETS_FILE
                        File containing multiple targets, one per line, in the format ip:port
```

### Examples

1. Test a single target:
```bash
python CVE-2025-29306-PoC -t 192.168.1.100:8080 -c "whoami"
```

2. Scan multiple targets from a file:
```bash
python CVE-2025-29306-PoC -f targets.txt -c "whoami"
```

3. Save output to file (automatically done):
```bash
python CVE-2025-29306-PoC -f targets.txt -c "whoami" > results.txt
```

## Target File Format

The targets file should contain one target per line in the format:
```
ip:port
```
Example:
```
192.168.1.100:80
10.10.10.5:443
172.16.32.15:8080
```

## Output

The script provides:
- Real-time progress with status for each target
- Detailed output for vulnerable hosts
- Summary table of all vulnerable hosts
- Automatic saving of full results to `foxcms_rce_results.txt`

![sample-output](https://github.com/user-attachments/assets/e1a2ccd7-ec9d-4606-ae3d-75615b11df8a)


## Disclaimer

This tool is for educational and authorized testing purposes only. The author is not responsible for any misuse or damage caused by this program.

## License

MIT License - See LICENSE file for details
文件快照

[4.0K] /data/pocs/55d1ae5d2286c4d278d233617cbf2397e9187c63 ├── [5.0K] CVE-2025-29306-PoC.py ├── [1.0K] LICENSE ├── [2.5K] README.md └── [ 40] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。