blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2

Preview meta tags from the blog.chebuya.com website.

Linked Hostnames

7

Search Engine Appearance

Google

https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2

SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)

Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.



Bing

SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)

https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2

Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.



DuckDuckGo

https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2

SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)

Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.

  • General Meta Tags

    15
    • title
      SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090) //
    • title
      Exploit-DB
    • title
      HackerOne
    • title
      GitHub
    • title
      Twitter
  • Open Graph Meta Tags

    5
    • og:url
      https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2/
    • og:title
      SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
    • og:description
      Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
    • US country flagog:locale
      en_us
    • og:type
      article
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
    • twitter:description
      Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
  • Link Tags

    2
    • shortcut icon
      /favicon.ico
    • stylesheet
      /css/main.min.ee73fb576303200d41c6bc20372653bfc6bc0ab470858ebbb72d7f322f4708b7.css

Links

13