POC详情: 865034a0aa916807a6c8fa0d4adbd511c5f3c89e

来源
关联漏洞
标题: Fortinet FortiWeb SQL注入漏洞 (CVE-2025-25257)
描述:Fortinet FortiWeb是美国飞塔(Fortinet)公司的一款Web应用层防火墙,它能够阻断如跨站点脚本、SQL注入、Cookie中毒、schema中毒等攻击的威胁,保证Web应用程序的安全性并保护敏感的数据库内容。 Fortinet FortiWeb 7.6.3及之前版本、7.4.7及之前版本、7.2.10及之前版本和7.0.10之前版本存在SQL注入漏洞,该漏洞源于对SQL命令中特殊元素中和不当,可能导致SQL注入攻击。
介绍
# CVE-2025-25257 - FortiWeb Vulnerability Checker & Exploit

A Python-based tool for checking and exploiting CVE-2025-25257 vulnerability in FortiWeb devices. This vulnerability allows SQL injection and remote code execution through a crafted Authorization header.


## 📋 Description

CVE-2025-25257 is a critical vulnerability in FortiWeb devices that allows:
- SQL injection via the Authorization header
- Remote code execution through webshell upload
- Unauthorized access to vulnerable systems

## 🚀 Features

- **Automated vulnerability detection** for single targets or bulk scanning
- **SQL injection exploitation** to upload webshells
- **Command execution** via uploaded webshell
- **Bulk target processing** from file input
- **Results logging** with timestamps
- **Comprehensive error handling**

## 📦 Requirements

```bash
pip install requests urllib3
```

## 🛠️ Installation

1. Clone the repository:
```bash
git clone https://github.com/yourusername/CVE-2025-25257.git
cd CVE-2025-25257
```

2. Install dependencies:
```bash
pip install -r requirements.txt
```

## 📖 Usage

### Vulnerability Checker (`vuln_check.py`)

Check a single target:
```bash
python3 vuln_check.py -t https://target.com
```

Check multiple targets from a file:
```bash
python3 vuln_check.py -l target.txt
```

### Command Execution (`exp.py`)

Execute commands on a vulnerable target:
```bash
python3 exp.py -t https://target.com -c "id"
```

## 📁 Files

- `vuln_check.py` - Main vulnerability checker and exploit
- `exp.py` - Command execution tool for vulnerable targets
- `target.txt` - Sample list of targets (replace with your own)
- `vuln.txt` - Output file with vulnerable targets (generated after scan)

## 🔍 How It Works

1. **SQL Injection**: Exploits the vulnerable API endpoint `/api/fabric/device/status`
2. **Webshell Upload**: Uses SQL injection to write a webshell to `/cgi-bin/x.cgi`
3. **Command Execution**: Executes commands via the uploaded webshell
4. **Verification**: Tests command execution to confirm successful exploitation

## 📊 Output

The tool generates a `vuln.txt` file containing:
- Timestamp of each scan
- Vulnerable target URLs
- Command execution results
- Scan statistics

Example output:
```
# CVE-2025-25257 Vulnerable Targets - 2025-01-27 10:30:15
# Format: [timestamp] target - command_output

[2025-01-27 10:30:15] https://target.com - uid=0(root) gid=0(root) groups=0(root)
```


---

**credit**:0xbigshaq
文件快照

[4.0K] /data/pocs/865034a0aa916807a6c8fa0d4adbd511c5f3c89e ├── [1.1K] exp.py ├── [2.4K] README.md ├── [ 33] requirements.txt └── [7.2K] vuln_check.py 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。