Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5309 PoC — BeyondTrust Remote Support和BeyondTrust Privileged Remote Access 安全漏洞

Source
Associated Vulnerability
Title:BeyondTrust Remote Support和BeyondTrust Privileged Remote Access 安全漏洞 (CVE-2025-5309)
Description:BeyondTrust Remote Support和BeyondTrust Privileged Remote Access(BeyondTrust PRA)都是美国BeyondTrust公司的产品。BeyondTrust Remote Support是一个适用于 Windows、Mac、Linux、Ios(iPad、iPhone)等的远程桌面访问、服务台和协作软件。BeyondTrust Privileged Remote Access是一款特权远程访问软件。 BeyondTrust Remote S
Description
🚨 CVE-2025-5309 Multi-Method SSTI Scanner | BeyondTrust Detection Tool by Issam
Readme
# CVE-2025-5309 Scanner

🚨 **CVE-2025-5309**: Server-Side Template Injection in Remote Support and Privileged Remote Access Chat Feature

## 📰 CVE Overview
A vulnerability in BeyondTrust Remote Support and Privileged Remote Access allows Server-Side Template Injection (SSTI), potentially leading to remote code execution via the chat feature.

- **CVE**: CVE-2025-5309
- **Risk**: High (Remote Code Execution)
- **Credit**: Jorren Geurts – [resillion.com](https://resillion.com/latest-news/be)
- **Searchable Services**: Over 1.2M services found on [hunter.how](https://hunter.how/list?searchVal=BeyondTrust)
- **Query**:
  ```
  product.name="BeyondTrust Remote Support"||product.name="BeyondTrust Privileged Remote Access"
  ```

## 🛡️ How to Fix
- Update to the latest secure version from [BeyondTrust](https://beyondtrust.com/trust-center/security-advisories)
- Disable or restrict public access to the chat system
- Monitor and restrict template processing in chat input

## 🔍 Usage

Install dependencies:

```bash
pip install -r requirements.txt
```

Run the scanner:

```bash
python3 scanner.py --query "BeyondTrust"
```

## 💡 Example Output

```
🚨 CVE-2025-5309 Scanner by Issam junior 🚨
[+] Searching for: BeyondTrust ...
[!] Possible vulnerable service found: 192.168.0.55:443
```

## 📌 Disclaimer
This tool is for **educational and security research purposes only**.
File Snapshot

[4.0K] /data/pocs/da87c6eba95a77c78cbc177a2f7daabee70bc02d ├── [ 119] LICENSE ├── [1.4K] README.md ├── [ 9] requirements.txt └── [3.1K] scanner.py 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.