blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2
Preview meta tags from the blog.chebuya.com website.
Linked Hostnames
7- 6 links togithub.com
- 2 links tox.com
- 1 link toblog.chebuya.com
- 1 link tohackerone.com
- 1 link topacketstormsecurity.com
- 1 link totraining.zeropointsecurity.co.uk
- 1 link totwitter.com
Search Engine Appearance
SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
Bing
SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
DuckDuckGo
SSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
Summary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
General Meta Tags
15- titleSSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090) //
- titleExploit-DB
- titleHackerOne
- titleGitHub
- titleTwitter
Open Graph Meta Tags
5- og:urlhttps://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2/
- og:titleSSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
- og:descriptionSummary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
og:locale
en_us- og:typearticle
Twitter Meta Tags
3- twitter:cardsummary
- twitter:titleSSRF on Sliver C2 teamserver via spoofed implant callback (CVE-2025-27090)
- twitter:descriptionSummary Sliver C2 is a open source cross-platform adversary emulation/red team framework utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which attackers could open a TCP connection on the teamserver to an arbitrary IP/port, and read and write traffic through the socket (a powerful form of SSRF). The consequences of exploiting this vulnerability could be anything from leaking teamserver IPs behind redirectors to moving laterally from the teamserver to other services.
Link Tags
2- shortcut icon/favicon.ico
- stylesheet/css/main.min.ee73fb576303200d41c6bc20372653bfc6bc0ab470858ebbb72d7f322f4708b7.css
Links
13- https://blog.chebuya.com
- https://github.com/ACE-Responder/RogueSliver
- https://github.com/BishopFox/sliver
- https://github.com/BishopFox/sliver/releases/tag/v1.5.43
- https://github.com/BishopFox/sliver/security/advisories/GHSA-fh4v-v779-4g2w