关联漏洞
描述
PoC for CVE-2025-34030 sar2html 'plot' parameter RCE
介绍
# CVE-2025-34030 - sar2html 'plot' parameter RCE
CVSS: <span style="color:rgb(192, 0, 0)">10.0 Critical</span><br>
Vulnerability: OS Command Injection<br>
Programming Language: PHP<br>
Exploit Code: Python <br>
References:
- https://nvd.nist.gov/vuln/detail/CVE-2025-34030
- https://www.vulncheck.com/advisories/sar2html-command-injection
## Description
sar2html version <= 3.2.1 contains an unauthenticated OS Command Injection vulnerability via the plot parameter in index.php (`index.php?plot=; <command>`) the output of the vulnerability is displayed in the application's interface after execution, "select # host" contains command output.
<br>
## Proof of Concept

文件快照
[4.0K] /data/pocs/799cc7717e52f1ff532c0edcdef861a277403115
├── [3.4K] exploit.py
├── [4.0K] img
│ └── [795K] CVE-2025-34030.gif
├── [ 714] README.md
└── [ 32] requirements.txt
1 directory, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。