关联漏洞
描述
Exploit Path Traversal in esm-dev
介绍
# CVE-2025-59342 - Path Traversal (esm-dev)
**Author: Byte Reaper**
## Description
CVE-2025-59342 is a path traversal vulnerability in esm.sh, a nobuild content delivery network (CDN) for modern web development, in version 136 and earlier.
The issue exists in the handling of the `X-Zone-Id` HTTP header, which is used to construct a filesystem path. The header value is not properly canonicalized or restricted to the application’s storage base directory.
As a result, supplying `../` sequences in `X-Zone-Id` can cause files to be written outside the intended storage location.
## Requirements :
```
Linux x86_64
GCC
```
## Build :
```
gcc exploit.c argparse.c -o CVE-2025-59342 -lcurl
```
## Run :
```
./CVE-2025-59342 -u http://target (auto port = 80)
- Verbose Mode :
./CVE-2025-59342 -u http://target -v
- Bypass WAF :
./CVE-2025-59342 -u http://target -v -b
- Cookies FILE :
./CVE-2025-59342 -u http://target -c [FILE] -v
- Target Port server :
./CVE-2025-59342 -u http://target -p [PORT]
- Payload :
./CVE-2025-59342 -u http://target -p [Payload injection]
```
## References :
- NVD : https://nvd.nist.gov/vuln/detail/CVE-2025-59342
## License :
MIT
文件快照
[4.0K] /data/pocs/c53232dd70ae3dfc06d91ac01062d21b9d1156f7
├── [ 29K] exploit.c
├── [1.0K] LICENSE
└── [1.2K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。