# Coolify 应用部署流程指令注入漏洞
## 概述
Coolify 在 v4.0.0-beta.420.6 之前的版本中存在远程代码执行漏洞。
## 影响版本
所有低于 v4.0.0-beta.420.6 的版本。
## 细节
漏洞存在于应用部署流程中。攻击者可通过认证并利用低权限成员账户,在创建项目时注入恶意的 Docker Compose 指令。通过构造恶意服务定义,攻击者可以挂载宿主机的根文件系统。
## 影响
攻击者可借此获得对底层服务器的完整 root 权限,造成系统完全失守。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A critical Remote Code Execution (RCE) vulnerability exists in Coolify's application deployment workflow. This flaw allows a low-privileged member to inject arbitrary Docker Compose directives during project creation or updates. By defining a malicious service that mounts the host filesystem an attacker can achieve root-level command execution on | https://github.com/Eyodav/CVE-2025-34159 | POC详情 |
标题: Release v4.0.0.-beta.420.7 · coollabsio/coolify · GitHub -- 🔗来源链接
标签: vendor-advisory patch
神龙速读标题: GitHub - Eyodav/CVE-2025-34159: A critical Remote Code Execution (RCE) vulnerability exists in Coolify's application deployment workflow. This flaw allows a low-privileged member to inject arbitrary Docker Compose directives during project creation or updates. By defining a malicious service that mounts the host filesystem an attacker can achieve root-level command execution on -- 🔗来源链接
标签: technical-description exploit
神龙速读暂无评论