关联漏洞
描述
Proof of Concept for CVE-2025-31161 / CVE-2025-2825
介绍
# CVE-2025-31161
Proof of Concept for CVE-2025-31161 / CVE-2025-2825
This POC will exploit the authbypass vulnerability to create a new user account with Admin level permissions.
The Auth Bypass requires the username (target_user) of an existing user on the CrushFTP server. The default is set to `crushadmin`
## Usage
```
usage: cve-2025-31161.py [-h] [--target_host TARGET_HOST] [--port PORT] [--target_user TARGET_USER] [--new_user NEW_USER] [--password PASSWORD]
Exploit CVE-2025-2825
options:
-h, --help show this help message and exit
--target_host TARGET_HOST
Target host
--port PORT Target port
--target_user TARGET_USER
Target user
--new_user NEW_USER New user to create
--password PASSWORD Password for the new user
```
## Detction and Mitigation.
For Immersive Customers you can find Practical Offensive and Defensive labs in the platform under the Latest CVEs section.
Additional details on this exploit can be found on Attacker KB
https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
文件快照
[4.0K] /data/pocs/7aa11630deb7b4028e1b9ec6bbff07f30a7b6d8d
├── [4.4K] cve-2025-31161.py
├── [1.0K] LICENSE
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。