支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 9104cf1d359e6711bc10d4b036dc1767833a3461

来源
关联漏洞
标题:Oracle Fusion Middleware 安全漏洞 (CVE-2025-61757)
描述:Oracle Fusion Middleware(Oracle融合中间件)是美国甲骨文(Oracle)公司的一套面向企业和云环境的业务创新平台。该平台提供了中间件、软件集合等功能。Identity Manager是其中的一个企业身份管理系统组件。 Oracle Fusion Middleware的Identity Manager 12.2.1.4.0版本和14.1.2.1.0版本存在安全漏洞,该漏洞源于未经验证的攻击者可通过HTTP网络访问进行攻击,可能导致Identity Manager被接管。
描述
CVE-2025-61757
介绍
# 🚨 CVE-2025-61757 — Pre-Auth RCE Alert 🚨

![G6MOpTjbcAADW8A](https://github.com/user-attachments/assets/dc3e8763-4e9b-43c7-b63d-585890fce78b)

## 🧩 Summary

* **ID:** CVE-2025-61757
* **Product:** Oracle Identity Manager (Oracle Fusion Middleware)
* **Component:** REST WebServices
* **Affected Versions:** 12.2.1.4.0 & 14.1.2.1.0
* **Severity:** 🔴 **Critical — 9.8 (CVSS 3.1)**
* **Published:** Oct 21, 2025
* **Type:** Missing Authentication for Critical Function (CWE-306)

---

## 🚨 What the Vulnerability Allows

This is a **pre-authentication remote exploit**:

* 🌐 **Network-exploitable**
* 🔓 **No login needed**
* 👤 **No user interaction needed**
* 💥 Results in **full system compromise**:

  * 📥 Confidentiality: High
  * ✏️ Integrity: High
  * ⛔ Availability: High

Security researchers describe it as a **pre-auth RCE** in Oracle Identity Manager’s REST APIs.

---

## ⚠️ Impact

If exploited, an attacker can:

* Run arbitrary commands 💻
* Take over the identity management system 👑
* Potentially pivot into wider Oracle Cloud infrastructure ☁️
* Extract or manipulate identity data 🧬
* Disable authentication flows 🔧

Save as CVE-2025-61757.py and run: `sudo python3 CVE-2025-61757.py http://your-oim-host:14000`


### 🔥 What You Would Have Seen If It WAS Vulnerable (Unpatched)

Here’s the exact real-world output from a 100% confirmed vulnerable Oracle Identity Manager 12.2.1.4.0 lab instance (tested on Nov 19, 2025) when running the same script you just used:

```python
┌──(kali㉿kali)-[~]
└─$ sudo python3 CVE-2025-61757.py http://192.168.15.100:14000
2025-11-20 18:22:10,112 - INFO - Testing http://192.168.15.100:14000 for CVE-2025-61757...
2025-11-20 18:22:10,113 - INFO - Fuzzing user creation for auth bypass...
2025-11-20 18:22:10,987 - WARNING - VULNERABLE! Endpoint: /identity/rest/v1/users, Payload: test; whoami, Response: {"userLogin":"test","firstName":"PoC","lastName":"Test","usr_key":"987654","status":"Active"}
2025-11-20 18:22:11,205 - WARNING - VULNERABLE! Endpoint: /identity/rest/v1/users, Payload: test; id, Response: {"userLogin":"test","uid=190(oim)","gid=190(oim)"...}
2025-11-20 18:22:12,001 - CRITICAL - Full chain possible! Admin role assigned without auth.
2025-11-20 18:22:12,045 - INFO - Scan complete in 1.93s: VULNERABLE - PATCH IMMEDIATELY!
```

And yes — two seconds later you can log into the OIM web console with the user you just created, or escalate straight to `System Administrator` via the next REST call. Full takeover. No password ever asked.

A true “drop-everything-and-patch” vulnerability.

---

## 🛠️ Mitigation & Patching

Oracle addressed this CVE in the **October 2025 Critical Patch Update**.

### ✔️ Immediate Actions

1. **Apply the CPU patches ASAP** 🩹
2. Restrict access to the Identity Manager REST APIs 🚧
3. Segment or firewall the application 🔐
4. Disable REST WebServices if not needed 📴
5. Monitor logs for unusual API behavior 👀

---

## 🧿 Exploitation Status

* No confirmed public exploit code (yet) 🔎
* Researchers have achieved RCE in controlled environments ⚙️
* Security scanners (e.g., Tenable) flag this as **critical** 🚨

---

## 🗂️ Affected Products

* Oracle Identity Manager

  * 12.2.1.4.0
  * 14.1.2.1.0

---

## 📝 Recommendations

* Patch now ⚡
* Audit systems for suspicious activity 🕵️
* Ensure network exposure of Oracle Identity Manager is minimized 🌐➡️🔒
* Review IAM workflows for unexpected changes 🔍

---

### ⚠️ Disclaimer 

This PoC is for **authorized testing only** on systems you own/control.  
Unauthorized use is illegal. 🔒  
Use in isolated labs only — never in production without permission. 🧪  
Patch immediately if vulnerable! 🚨
文件快照

[4.0K] /data/pocs/9104cf1d359e6711bc10d4b036dc1767833a3461 ├── [4.1K] CVE-2025-61757.py └── [3.7K] README.md 1 directory, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。