关联漏洞
介绍
# CVE-2025-20229 Exploit
## Overview
This repository contains an exploit for CVE-2025-20229, a Remote Code Execution (RCE) vulnerability in Splunk Enterprise and Splunk Cloud Platform. The exploit allows a low-privileged user to upload malicious files, enabling arbitrary code execution on the target system.
## Requirements
- Python 3.8+
- Valid authentication token for a low-privileged Splunk account
- Target Splunk instance URL
## Usage
1. Install dependencies:
```bash
pip install -r requirements.txt
```
2. Run the exploit script:
```bash
python3 cve-2025-20229.py <target_url> <malicious_file> <auth_token>
```
- `<target_url>`: The Splunk instance URL (e.g., `http://target:8000`)
- `<malicious_file>`: Path to the malicious file to upload
- `<auth_token>`: Valid Splunk authentication token
## Example
```bash
python3 cve-2025-20229.py http://target:8000 malicious.sh abc123token
```
## Exploit
[href](https://tinyurl.com/2ct2kp73)
## Disclaimer
This exploit is provided for educational and authorized security testing purposes only. Use on systems without explicit permission is illegal and prohibited. The authors are not responsible for any misuse or damage caused by this tool.
文件快照
[4.0K] /data/pocs/8c5f6bb6714e7ef58e1ce568c98af297e6aacf29
└── [1.2K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。