Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34028 PoC — Commvault Command Center Innovation Release <= 11.38.25 Unathenticated Install Package Path Traversal

Source
Associated Vulnerability
Title:Commvault Command Center Innovation Release <= 11.38.25 Unathenticated Install Package Path Traversal (CVE-2025-34028)
Description:The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
Description
Commvault CVE-2025-34028 endpoint scanner using Nmap NSE. For ethical testing and configuration validation.
Readme
# infra-monitor

**infra-monitor** is a lightweight Nmap NSE script for silently testing response consistency across web infrastructure routes.  
It helps detect anomalies in access control, configuration discrepancies, or potential inconsistencies in how different endpoints respond.

This tool is designed for **ethical diagnostics** and **authorized infrastructure audits**.

---

## 🔍 Features

- Compares HTTP responses between normal and slightly varied access patterns
- Supports multiple HTTP headers to simulate real client traffic
- Detects potential filtering behavior or inconsistent behavior on protected routes
- Fully silent and unobtrusive by design — does not trigger obvious vulnerability scans

---

## 📅 Installation

1. Download the script:

```bash
curl -O https://raw.githubusercontent.com/your-user/infra-monitor/main/infra-monitor.nse
```

2. Run it using Nmap:

```bash
nmap -p443 --script=./infra-monitor.nse www.example.com
```

Or for multiple hosts:

```bash
nmap -p443 --script=./infra-monitor.nse -iL targets.txt
```

---

## 📄 Example Output

```
| infra-monitor: Responses matched normally
|_No unusual behavior observed
```

```
| infra-monitor: Response mismatch: 200 vs 403
|_Observed activity at: /ccenter/setup.jsp (code: 500)
```

---

## ⚠️ Legal & Ethical Use

This script is intended for **authorized security assessments and diagnostic audits only**.  
Do not use against targets you do not own or explicitly have permission to test.

---

## 👤 Author

Built by [Eliran Loai Deeb](https://www.linkedin.com/in/loai-deeb), cybersecurity researcher & ethical hacker.

---

File Snapshot

[4.0K] /data/pocs/40615c055c2f0800810309122021c5b10cd71845 ├── [1.7K] infra-monitor.nse └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →