POC详情: 930f3583a87015714f9a6c97a1addaca9ca08f28

来源
关联漏洞
标题: FOG 访问控制错误漏洞 (CVE-2025-58443)
描述:FOG是FOG Project开源的一个开源计算机克隆与管理系统。 FOG 1.5.10.1673及之前版本存在访问控制错误漏洞,该漏洞源于认证绕过,可能允许攻击者未经认证转储完整SQL数据库。
描述
FOGProject Authentication bypass CVE-2025-58443 Exploit
介绍
# CVE-2025-58443

exploit POC for https://github.com/FOGProject/fogproject which is authentication bypass leads to dump DB that include full DB dump, that include clear text password and users and admin password hash. 

vulnerable version : 1.5.10.1673


below a script that will exploit the vulnerability and can do the following :
Dump Full MysqlDB
exploit SSRF vulnerability
list files on the server


the DB dump contains the hashed passwords and clear text passwords for FTPs etc ...

<img width="887" height="162" alt="image" src="https://github.com/user-attachments/assets/e6ab3a88-4190-48af-84b6-48f77d2a324c" />

resuts : 

<img width="947" height="198" alt="image" src="https://github.com/user-attachments/assets/ffd77119-5bcd-4f7e-8bcd-d6ca4bcd65c4" />

SSRF exploit :

<img width="946" height="117" alt="image" src="https://github.com/user-attachments/assets/048f95bb-4f7f-428b-98a3-6ac40310a76e" />

list files exploit :

<img width="936" height="376" alt="image" src="https://github.com/user-attachments/assets/994d8ed9-0fd2-4d8a-9133-08ceda9b64ce" />



```
I, the creator, am not responsible for any actions, and or damages, caused by this software.

You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only.

This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use.

By using this software, you automatically agree to the above.
```
文件快照

[4.0K] /data/pocs/930f3583a87015714f9a6c97a1addaca9ca08f28 ├── [4.4K] exp.py └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。