POC详情: 7077b6822a8c2909fdb5de713a09adbafd6acdea

来源
关联漏洞
标题: Pterodactyl Panel 代码注入漏洞 (CVE-2025-49132)
描述:Pterodactyl Panel是Pterodactyl开源的一个免费的开源游戏服务器管理面板。 Pterodactyl Panel 1.11.11之前版本存在代码注入漏洞,该漏洞源于/locales/locale.json端点未验证locale和namespace参数,可能导致任意代码执行。
描述
This is an improved version of the CVE-2025-49132 proof of concept exploit.
介绍
# CVE-2025-49132 PoC (Improved)

This is an improved version of the CVE-2025-49132 proof of concept exploit.

## CVE Information

- **CVE ID**: CVE-2025-49132
- **NVD Reference**: [https://nvd.nist.gov/vuln/detail/cve-2025-49132](https://nvd.nist.gov/vuln/detail/cve-2025-49132)
- **Wiz Database**: [https://www.wiz.io/vulnerability-database/cve/cve-2025-49132](https://www.wiz.io/vulnerability-database/cve/cve-2025-49132)

## Original Work

This improvement is based on the original PoC from [0xtensho/CVE-2025-49132-poc](https://github.com/0xtensho/CVE-2025-49132-poc/tree/main).

## Improvements

- **Code Quality**: Refactored to follow Python Black and PEP8 standards
- **Better HTTP Client**: Replaced `os.system()` with `requests` library for more reliable HTTP requests
- **Descriptive Variables**: Renamed variables for better code readability
- **CLI Interface**: Added proper command-line argument parsing with help messages
- **Error Handling**: Improved error handling and user feedback

## Usage

```bash
python poc.py --host <target_host> --command <command_to_execute>
```

### Examples

```bash
# Execute 'whoami' command
python poc.py --host 192.168.1.100 --command "whoami"

# Execute 'id' command
python poc.py --host example.com --command "id"
```

### Options

- `--host`, `-H`: Target host (required)
- `--command`, `-c`: Command to execute on target (required)
- `--help`, `-h`: Show help message

## Requirements

```
requests>=2.25.0
```

Install with:
```bash
pip install requests
```

## Disclaimer

This tool is for educational and authorized penetration testing purposes only. Only use on systems you own or have explicit permission to test.# CVE-2025-49132_poc
文件快照

[4.0K] /data/pocs/7077b6822a8c2909fdb5de713a09adbafd6acdea ├── [2.8K] poc.py └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。