Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11371 PoC — Gladinet CentreStack和Gladinet TrioFox 安全漏洞

Source
Associated Vulnerability
Title:Gladinet CentreStack和Gladinet TrioFox 安全漏洞 (CVE-2025-11371)
Description:Gladinet CentreStack和Gladinet TrioFox都是美国Gladinet公司的产品。Gladinet CentreStack是一个主要移动访问和安全共享解决方案。提供自托管云存储。Gladinet TrioFox是一个云服务托管版平台。 Gladinet CentreStack和Gladinet TrioFox 16.7.10368.56560及之前版本存在安全漏洞,该漏洞源于默认安装和配置中存在未经认证的本地文件包含缺陷,可能导致系统文件意外泄露。
Readme
# CVE-2025-11371

### Overview
This repository contains a proof-of-concept exploit for CVE-2025-11371, an unauthenticated Local File Inclusion (LFI) vulnerability in Gladinet CentreStack and TrioFox. The exploit allows remote retrieval of sensitive system files, such as the Web.config, which can expose machine keys leading to further RCE via deserialization flaws like CVE-2025-30406.

Affected versions: All versions up to and including 16.7.10368.56560.  


### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)

### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the exploit: `python exploit.py --target <target_url> --file "/path/to/Web.config"`

Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.


### How It Works
The vulnerability stems from improper input validation in the UploadDownloadProxy component's temp handler. The exploit crafts a specially formed request to the endpoint, appending traversal sequences to reach outside the web root.

### Proof of Concept
Tested against a default CentreStack setup on Windows Server 2019. Successful file reads include:
- Web.config (machine key disclosure)
- Machine.config
- Sensitive logs in %PROGRAMDATA%

### Ethical Use Warning
- This script is a proof-of-concept for CVE-2025-11371 for educational and authorized security testing purposes.
- **Do not use this script on systems without explicit permission from the system owner.**
- Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
- Always obtain written consent before testing any system.

### PoC Exploit - [href](https://tinyurl.com/2jkebbrv)

For any inquiries, please email me at: evilforti@hotmail.com
File Snapshot

[4.0K] /data/pocs/35f68d3da182b556f05cf1d20ea0e3254af84da0 └── [1.9K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.