Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-9074 PoC — Docker Desktop 安全漏洞

Source
Associated Vulnerability
Title:Docker Desktop 安全漏洞 (CVE-2025-9074)
Description:Docker Desktop是美国Docker公司的一个基于容器技术的用于轻量化部署应用的桌面软件。该产品可提供桌面环境可支持在Linux/Windows/Mac OS系统上创建一个容器(轻量级虚拟机)并部署和运行应用程序,以及通过配置文件实现应用程序的自动化安装、部署和升级。 Docker Desktop存在安全漏洞,该漏洞源于本地Linux容器可访问Docker Engine API,可能导致执行特权命令。
Description
New vulnerability found in Docker. Credit for finding the vulnerability goes to Felix Boulet
Readme
# CVE-2025-9074 - Docker Remote API (Lab PoC)

> ⚠️ **Disclaimer:**  
> This repository is for **educational and research purposes only**.  
> Do **not** use this code outside of a controlled environment that you own.  
> The author is not responsible for misuse.  

---

## Overview
This repository contains a proof-of-concept (PoC) for **CVE-2025-9074**, a misconfiguration vulnerability involving the Docker Remote API.  
When the Docker daemon was exposed without authentication, an attacker could issue API requests to create and start containers.  

This PoC demonstrates the issue in a safe and controlled environment.  
**Note:** This vulnerability has been patched.  

---

## Original Write-Up
Credit for the original research and write-up goes to:  
🔗 [qwertysecurity.com – Blog Post](https://blog.qwertysecurity.com/Articles/blog3.html)  

This repository adapts that work into a Python PoC for easier testing in lab environments.  

---

## How it Works
- The script interacts with the Docker Remote API over HTTP.  
- It creates a new container with a specified command.  
- The container is then started via the API.  

The vulnerability existed if the Docker daemon was listening on `tcp://0.0.0.0:2375` without TLS or authentication.  

---

## Usage

### 1. Run Docker with the API exposed (lab only)
```bash
dockerd -H tcp://0.0.0.0:2375
File Snapshot

[4.0K] /data/pocs/fb30fabc39191bf7fa96a8f72596adeee5562aae ├── [2.3K] exploit.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.