Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21202 PoC — Microsoft Windows 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 访问控制错误漏洞 (CVE-2025-21202)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows存在访问控制错误漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core install
Description
CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
Readme
# CVE-2025-21202-exploit
CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
# CVE-2025-12101 – Reflected XSS Detection Tool  
![Python](https://img.shields.io/badge/Python-3.7%2B-blue)
![Status](https://img.shields.io/badge/Project-PoC-orange)
![Security](https://img.shields.io/badge/Security-Research%20Only-red)

A proof-of-concept Python tool for identifying reflected Cross-Site Scripting (XSS) in Citrix NetScaler ADC / Gateway appliances affected by **CVE-2025-12101**.

This script sends a crafted SAMLResponse payload via a raw POST request to `/cgi/logout` and analyzes the server's response for reflected JavaScript code.

---

## 🔥 Features

- 🔍 Detects reflection of `<script>alert(1)</script>`
- 📡 Sends raw HTTP request (no external libraries used)
- 🔐 Full HTTPS (SSL/TLS) support
- 🎨 Color-coded CLI output
- 🧪 Optional flag to display **final sent request** and **server response**
- ⚡ Fast — built only on the Python standard library

---

## 📦 Installation

Clone the repository:

```bash
git clone https://github.com/yourname/CVE-2025-12101-Scanner.git
cd CVE-2025-12101-Scanner
python3 CVE-2025-12101-Scanner.py -u <url> --show #to show the request and response

File Snapshot

[4.0K] /data/pocs/6a9a2018a088f135b8a3d857f9e7af557ec65238 ├── [4.0K] cve_2025_12101_exploit.py └── [1.3K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.