POC详情: ed98b7339ce48ba0b5a81c3514c0266d9412ac93

来源
关联漏洞
标题: Vite 访问控制错误漏洞 (CVE-2025-30208)
描述:Vite是Vite开源的一种新型的前端构建工具。 Vite存在访问控制错误漏洞,该漏洞源于URL中的`?raw??`或`?import&raw??`可以绕过文件访问限制,返回任意文件内容。
介绍
🔥 Vite Dev Server Vulnerability Scanner (CVE-2025-30208)






🚀 Overview

This tool scans for CVE-2025-30208, a vulnerability in the Vite Dev Server. It allows security researchers to quickly detect vulnerable instances using multiple payloads.

⚡ Features

✅ Single URL scanning (-u URL)
✅ Mass scanning from a file (-f file.txt)
✅ Multiple payloads for thorough testing
✅ Multi-threading for faster results
✅ Saves vulnerable URLs to vulnerable.txt

🛠 Installation

# Clone the repository
git clone https://github.com/0xshaheen/CVE-2025-30208.git
cd CVE-2025-30208

# Install dependencies
pip install -r requirements.txt

🚨 Usage

Scan a single URL:

python scanner.py -u http://example.com

Scan multiple URLs from a file:

python scanner.py -f urls.txt

📂 Output

All vulnerable URLs will be saved in vulnerable.txt.

⚠️ Disclaimer

This tool is intended for educational and authorized security testing purposes only. The developer is not responsible for any misuse.

🔗 GitHub: github.com/0xshaheen

文件快照

[4.0K] /data/pocs/ed98b7339ce48ba0b5a81c3514c0266d9412ac93 ├── [2.8K] exploit.py └── [1.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。