Skip to content

gmh5225/ExploitCVE2025

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ExploitCVE2025

ExploitCVE2025 - SAP Path Traversal Auto-Exploit Tool

An automated exploitation tool for CVE-2025-31324, targeting SAP systems vulnerable to arbitrary file upload via path traversal.


Features

  • πŸ“„ Automatic path traversal payload generation

  • πŸš€ Multi-target exploitation (bulk targets list)

  • πŸ”₯ SAP system detection

  • πŸ›°οΈ Proxy support (e.g., Burp Suite interception)

  • πŸ›‘οΈ SSL certificate bypass option

  • πŸ“œ Brute-force common upload endpoints

  • 🐚 Auto-deployment and interaction with uploaded WebShells

  • πŸ“‘ Detailed logs (exploit_log.txt) and HTML reporting (report.html)

  • Installation

Clone the repository and install locally:

git clone https://github.com/Profanatic/ExploitCVE2025

cd exploitcve2025

chmod +x *.py

python3 exploitcve2025.py --help

Examples Basic usage:

python3 exploitcve2025.py --targets targets.txt

Ignore SSL certificate verification:

python3 exploitcve2025.py --targets targets.txt --no-verify

Use a proxy (e.g., Burp Suite or mitmproxy):

python3 exploitcve2025.py --targets targets.txt --proxy http://127.0.0.1:8080

Example targets.txt

http://192.168.1.100/

https://sap-vulnerable.example.com/

192.168.1.105

sapserver.target.net

Output Files

exploit_log.txt β€” A detailed exploitation log file.

report.html β€” A graphical HTML report listing discovered WebShells.

Disclaimer This tool is intended for authorized penetration testing and educational purposes only. Unauthorized exploitation of systems without permission is illegal and unethical. Use it responsibly.

Author Profanatica

About

ExploitCVE2025 - SAP Path Traversal Auto-Exploit Tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%