POC详情: c7e7bb265ad218825ec6b6a15e01539e98588763

来源
关联漏洞
标题: mailcow dockerized 输入验证错误漏洞 (CVE-2025-25198)
描述:mailcow dockerized是mailcow开源的一个应用程序。 mailcow dockerized存在输入验证错误漏洞,该漏洞源于密码重置功能中存在一个漏洞。
描述
Captures password reset tokens from Mailcow Host header injection attacks. 
介绍
# HTTPS File Server

A secure HTTPS file server implemented in Go, designed to serve static files over encrypted connections with self-signed certificate support.

## Features

- Serves static files over HTTPS
- Automatic self-signed certificate generation
- Request logging with response codes and timing
- Secure TLS configuration (TLS 1.2+)
- Protection against path traversal attacks
- Automatic MIME type detection
- Cross-platform compatibility

## Prerequisites

- Go 1.16 or higher
- OpenSSL (for certificate generation)

## Installation and Set Up

```bash
git clone https://github.com/enzocipher/CVE-2025-25198.git
cd https-file-server
go build -o https-server
./https-server
```
文件快照

[4.0K] /data/pocs/c7e7bb265ad218825ec6b6a15e01539e98588763 ├── [1.0K] LICENSE ├── [3.2K] poc.go └── [ 690] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。