POC详情: a2a41aa91187a9219801c3dfb6dffa57f4872dab

来源
关联漏洞
标题: Langflow 安全漏洞 (CVE-2025-3248)
描述:Langflow是Langflow开源的一个用于构建多代理和 RAG 应用程序的可视化框架。 Langflow 1.3.0之前版本存在安全漏洞,该漏洞源于/api/v1/validate/code端点存在代码注入漏洞,可能导致远程未经验证的攻击者执行任意代码。
描述
Powerful unauthenticated RCE scanner for CVE-2025-3248 affecting Langflow < 1.3.0
介绍
<img src="https://raw.githubusercontent.com/issamjr/CVE-2025-3248-Scanner/refs/heads/main/img.jpg" />

# CVE-2025-3248 Langflow RCE Scanner

## 🔍 Description

A powerful, unauthenticated RCE scanner for CVE-2025-3248 in vulnerable Langflow instances.

- **CVE**: 2025-3248  
- **Type**: Remote Code Execution (Unauthenticated)  
- **Affected**: Langflow < 1.3.0  
- **Author**: Issam Junior ([@issamiso](https://t.me/issamiso))

---

## 💥 Vulnerability Overview

Langflow's `/api/v1/validate/code` endpoint insecurely executes user-supplied code using Python `exec()`, without authentication or sandboxing. This enables remote attackers to execute arbitrary Python code.

---

## ✅ Protection

- Upgrade to Langflow **1.3.0 or newer**
- Block access to `/api/v1/validate/code`
- Use proper code sandboxing (e.g., Pyodide, Docker, restricted ASTs)

---

## ⚙️ Usage

```bash
git clone https://github.com/issamjr/CVE-2025-3248-Scanner.git
cd CVE-2025-3248-Scanner
pip install -r requirements.txt
python3 scanner.py --url http://example.com/
python3 scanner.py --list targets.txt
```

---

## 🔐 Disclaimer

This tool is for **authorized security research** only. Misuse is prohibited.

---

## 🛠️ Contact

Developer: **Issam Junior**  
Telegram: [@issamiso](https://t.me/issamiso)  
GitHub: [github.com/issamjr](https://github.com/issamjr)
文件快照

[4.0K] /data/pocs/a2a41aa91187a9219801c3dfb6dffa57f4872dab ├── [ 60K] img.jpg ├── [1.3K] README.md ├── [ 18] requirements.txt └── [2.3K] scanner.py 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。