POC详情: 7aa11630deb7b4028e1b9ec6bbff07f30a7b6d8d

来源
关联漏洞
标题: CrushFTP 安全漏洞 (CVE-2025-31161)
描述:CrushFTP是CrushFTP公司的一款文件传输服务器。 CrushFTP 10.8.4之前的10.x本和11.3.1之前的11.x版本存在安全漏洞,该漏洞源于认证绕过漏洞,可能导致账户接管。
描述
Proof of Concept for CVE-2025-31161 / CVE-2025-2825
介绍
# CVE-2025-31161
Proof of Concept for CVE-2025-31161 / CVE-2025-2825

This POC will exploit the authbypass vulnerability to create a new user account with Admin level permissions. 
The Auth Bypass requires the username (target_user) of an existing user on the CrushFTP server. The default is set to `crushadmin`

## Usage

```
usage: cve-2025-31161.py [-h] [--target_host TARGET_HOST] [--port PORT] [--target_user TARGET_USER] [--new_user NEW_USER] [--password PASSWORD]

Exploit CVE-2025-2825

options:
  -h, --help            show this help message and exit
  --target_host TARGET_HOST
                        Target host
  --port PORT           Target port
  --target_user TARGET_USER
                        Target user
  --new_user NEW_USER   New user to create
  --password PASSWORD   Password for the new user
```

## Detction and Mitigation. 

For Immersive Customers you can find Practical Offensive and Defensive labs in the platform under the Latest CVEs section. 

Additional details on this exploit can be found on Attacker KB

https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
文件快照

[4.0K] /data/pocs/7aa11630deb7b4028e1b9ec6bbff07f30a7b6d8d ├── [4.4K] cve-2025-31161.py ├── [1.0K] LICENSE └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。