POC详情: c17813519e71d4ebce5ce294ffd54ad59a55a0ba

来源
关联漏洞
标题: ISC BIND 9 安全漏洞 (CVE-2025-40778)
描述:ISC BIND 9是ISC组织的一个域名系统软件。 ISC BIND 9 9.11.0版本至9.16.50版本、9.18.0版本至9.18.39版本、9.20.0版本至9.20.13版本、9.21.0版本至9.21.12版本、9.11.3-S1版本至9.16.50-S1版本、9.18.11-S1版本至9.18.39-S1版本和9.20.9-S1版本至9.20.13-S1版本存在安全漏洞,该漏洞源于接受应答记录时过于宽松,可能导致缓存中注入伪造数据。
描述
POC CVE-2025-40778: Cache Poisoning BIND 9 👾
介绍
# CVE-2025-40778 Proof of Concept

Educational demonstration of DNS Cache Poisoning vulnerability via Additional Records injection.

## ⚠️ Disclaimer

**FOR EDUCATIONAL PURPOSES ONLY**

This tool is provided for educational and authorized security testing purposes only. Unauthorized use of this tool against systems you do not own or have explicit permission to test is illegal and unethical.

The author assumes no liability for misuse or damage caused by this tool.

## 📋 Description

This PoC demonstrates how a compromised authoritative DNS server can inject poisoned records into DNS responses, potentially redirecting users to malicious servers without their knowledge.

**Attack Vector:**
- Compromised authoritative nameserver injects additional DNS records
- Poisoned records get cached by recursive resolvers
- Users querying legitimate domains get redirected to attacker-controlled IPs
- Enables transparent phishing attacks (correct URL, malicious server)

## 🔧 Requirements

```bash
pip install dnslib
pip install dnspython
文件快照

[4.0K] /data/pocs/c17813519e71d4ebce5ce294ffd54ad59a55a0ba ├── [6.7K] auth_poison.py ├── [ 15K] CVE-2025-40778.md ├── [1.0K] README.md ├── [1.1K] readme.txt ├── [ 45] requirements.txt └── [5.5K] validate_poc_forwarder.py 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。