POC详情: 56e449822af030a5c24cae4042768ecae293c569

来源
关联漏洞
标题: Grafana 安全漏洞 (CVE-2025-4123)
描述:Grafana是Grafana开源的一套提供可视化监控界面的开源监控工具。该工具主要用于监控和分析Graphite、InfluxDB和Prometheus等。 Grafana存在安全漏洞,该漏洞源于客户端路径遍历和开放重定向结合,可能导致跨站脚本攻击。
描述
CVE-2025-4123 Grafana Open Redirect Exploit
介绍
# CVE-2025-4123 PoC

**A small proof-of-concept tool** — sends a specific payload to a target and checks for 301/302 redirect responses, reporting the `Location` header.

> This repository is intended for educational/research purposes only. Follow responsible disclosure policies. Below are usage and build instructions.

---

## Summary

This tool sends a request to a domain with the following payload appended, and if the server responds with 301 (Moved Permanently) or 302 (Found), it checks the `Location` header to detect a potential vulnerability.

Payload: `/public/..%2F%5cgoogle.com%2F%3f%2F..%2F..`

The program disables Go's automatic redirect following via the `CheckRedirect` function, allowing inspection of the initial response.

---

## Requirements

* Go 1.20+ (or any recent Go version)
* Internet access (for the target domain)

---

## Build

You can build an executable (Windows `.exe`) with the following commands:

```bash
# Linux/macOS
 go build -o cve-2025-4123 main.go

# Windows (PowerShell or CMD)
 go build -o CVE-2025-4123.exe main.go
```

---

## Usage

```
Usage: CVE-2025-4123.exe [https://example.com]
```

Example:

```bash
./CVE-2025-4123.exe https://target.example.com
```

The program does the following:

* Sends a GET request to the provided domain (`os.Args[1]`) with the payload appended.
* If the response is 301 or 302, it prints the `Location` header: `VULN FOUND: <location>`
* Otherwise, it prints `CVE-2025-4123 Not Found`.
* Any redirected requests are also printed via the `CheckRedirect` callback: `Redirected to <URL>`.

---

## Example Output

Successful detection (example):

```
VULN FOUND: https://google.com/
```

Redirect tracking via `CheckRedirect` callback might output:

```
Redirected to  https://google.com/
```

---

## Notes

* By default, `http.Get` automatically follows 301/302 redirects. In this PoC, `CheckRedirect` is used to disable automatic following, allowing direct access to the `Location` header.
* The `Location` header may not always be an absolute URL; it could be relative or in another format. In such cases, use `url.Parse` and `resp.Request.URL.ResolveReference` to construct the full URL.
* Do not test on systems without permission. Unauthorized testing may be illegal.

---

## Development / Improvement Suggestions

* Add CLI argument validation and flags like `--timeout`.
* Add output options `-o/--output` to save results in JSON or CSV.
* Implement parallel scanning (concurrency) carefully to avoid overloading targets.
* Handle empty or unexpected `Location` headers with robust parsing/normalization.

---


## Responsible Disclosure

If this PoC detects a real vulnerability, contact the target organization's security team and report it responsibly. Coordinate with the organization before making any public disclosure.

---

文件快照

[4.0K] /data/pocs/56e449822af030a5c24cae4042768ecae293c569 ├── [7.8M] CVE-2025-4123.exe ├── [ 21] go.mod ├── [ 844] main.go └── [2.8K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。