Skip to content

Conversation

@gcasaldi
Copy link

…E (CVE-2025-58434)

  • Add LangChain SSRF CVE-2024-12822 detector with comprehensive tests
  • Add Flowise RCE CVE-2025-58434 detector with payload framework integration
  • Include full documentation and remediation guidance for both vulnerabilities
  • Follow Tsunami plugin development best practices and code style

CVE-2025-58434)

- Add LangChain SSRF CVE-2024-12822 detector with comprehensive tests
- Add Flowise RCE CVE-2025-58434 detector with payload framework integration
- Include full documentation and remediation guidance for both vulnerabilities
- Follow Tsunami plugin development best practices and code style
This commit adds a comprehensive suite of professional security testing tools:

🎯 Interactive Exploit PoC (exploit_poc.py)
- Interactive menu-driven exploitation framework
- Automatic endpoint discovery
- Multi-cloud metadata extraction (AWS/GCP/Azure)
- Internal network port scanning
- Proxy integration for traffic analysis
- Full automation mode

☁️ Cloud Metadata Harvester (cloud_harvester.py)
- Automated credential extraction from 5 cloud providers
- AWS IAM credentials with IMDSv2 bypass attempts
- GCP service account tokens
- Azure managed identity tokens
- Alibaba Cloud and DigitalOcean support
- Export credentials in ready-to-use formats (AWS CLI, gcloud)
- JSON output for reporting integration

🔬 Multi-Vector SSRF Tester (multi_vector_tester.py)
- 15+ advanced bypass techniques
- Timing-based blind SSRF detection
- Protocol smuggling (Gopher, Dict, LDAP, etc.)
- DNS exfiltration testing
- URL parser confusion attacks
- Network pivoting capabilities
- Localhost variation testing

📊 Professional Report Generator (report_generator.py)
- Executive-ready HTML reports with modern design
- CVSS scoring and impact assessment
- Detailed technical findings
- Interactive PoC timeline
- Comprehensive remediation recommendations
- Print-friendly and responsive layout

🚀 Unified Suite (ssrf_suite.py)
- Single entry point for all tools
- Orchestrated attack chain automation
- Interactive menu interface
- End-to-end workflow from discovery to reporting

📚 Complete Documentation
- TOOLS_README.md: Comprehensive toolkit guide
- QUICKSTART.md: Quick reference and examples
- demo.sh: Interactive demonstration script
- requirements.txt: Python dependencies

Key Features:
✅ Professional UX with color-coded output
✅ Complete cloud credential harvesting
✅ Advanced bypass techniques
✅ Blind SSRF detection
✅ DNS exfiltration
✅ Professional reporting
✅ Full automation support
✅ Proxy integration
✅ Multi-cloud support

This toolkit provides security researchers and penetration testers with
a complete, production-ready suite for CVE-2024-12822 assessment and
exploitation in authorized testing scenarios.

Total: 122KB of professional security tooling
Tested on: Python 3.8+
Dependencies: requests, colorama
Copy link
Author

@gcasaldi gcasaldi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This contribution adds two Python-based Tsunami plugins targeting recently disclosed vulnerabilities affecting AI-driven application stacks:
a detector for LangChain SSRF (CVE-2024-12822), focused on identifying unsafe request routing patterns,
and a detector for Flowise RCE (CVE-2025-58434), implemented using payload-based validation aligned with Tsunami’s detection framework.
Both plugins include test coverage, documentation, and remediation guidance, and were developed following existing Tsunami plugin best practices and code style.
The goal is to extend Tsunami’s coverage to emerging AI/LLM-related attack surfaces without introducing invasive changes to the core framework.
Thank you for your time and review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant