POC详情: cc76b00a7116056b7c1806036487c6ab1c4be016

来源
关联漏洞
标题: Sitecore Experience Manager 安全漏洞 (CVE-2025-53694)
描述:Sitecore Experience Manager(XM)是丹麦Sitecore公司的一个管理软件。 Sitecore Experience Manager 9.2至10.4版本和Sitecore Experience Platform 9.2至10.4版本存在安全漏洞,该漏洞源于向未授权参与者暴露敏感信息。
描述
From Information Disclosure to RCE in Sitecore Experience Platform (XP)
介绍
# Sitecore CVE Chain Exploits

This repository contains proof-of-concept exploits for a critical vulnerability chain in Sitecore Experience Platform (XP) versions up to 10.4.1.

## Vulnerabilities

- **CVE-2025-53694:** Information Disclosure
- **CVE-2025-53693:** Cache Poisoning
- **CVE-2025-53691:** Remote Code Execution

## Exploits
> All 3 exploits are available separately in my profile, the `chain.py` file contains the logic of the 3 orchestrated in a chain for cache poisoning to RCE escalation, the `cve_2025_5369*.py` files mentioned below were redundant and have been removed.
- `cve_2025_53694.py`: Information Disclosure PoC  // Removed
- `cve_2025_53693.py`: Cache Poisoning PoC  // Removed
- `cve_2025_53691.py`: RCE via Deserialization PoC  // Removed
- `chain.py`: Complete exploit chain (all CVEs)
- `sitecore.yaml`: [Nuclei](https://github.com/projectdiscovery/nuclei) template, not validated or tested on real targets
- `test.py`: Test script for local environment, make sure to set the correct port // Temporarily removed, incomplete detection

## Usage

### Individual Exploits

- **[CVE-2025-53694](https://github.com/blueisbeautiful/CVE-2025-53694/tree/main):** `python3 exploit.py <target_url>`
- **[CVE-2025-53693](https://github.com/blueisbeautiful/CVE-2025-53693/tree/main):** `python3 exploit.py <target_url>`
- **[CVE-2025-53691](https://github.com/blueisbeautiful/CVE-2025-53691/tree/main):** `python3 exploit.py <target_url> --command "<command>"`

### Exploit Chain

```bash
python3 chain.py <target_url> --command "<command>"
```

### Nuclei template
- Download go
- Install nuclei
- Run `nuclei -t sitecore.yaml -u <target_url>` or `cat targets.txt | nuclei -t sitecore.yaml`

### Documentation

See full explanation [here](https://github.com/blueisbeautiful/CVE-2025-53694-to-CVE-2025-53691/blob/main/REPORT.md)

## Disclaimer

These exploits are for educational and research purposes only. Do not use them on systems you do not own or have permission to test.
文件快照

[4.0K] /data/pocs/cc76b00a7116056b7c1806036487c6ab1c4be016 ├── [ 15K] chain.py ├── [4.6K] dorks.md ├── [1.0K] LICENSE ├── [2.0K] README.md ├── [2.9K] REPORT.md └── [2.8K] sitecore.yaml 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。