CVE-2025-62376 (CNNVD-202510-1717)

CRITICAL
中文标题:
DOJO 授权问题漏洞
英文标题:
pwn.college DOJO vulnerable to improper authentication in workspace endpoint allowing unauthorized Windows VM access
CVSS分数: 9.5
发布时间: 2025-10-14 21:58:27
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

DOJO是pwn.college开源的一款JavaScript工具箱。 DOJO存在授权问题漏洞,该漏洞源于/workspace端点身份验证不当,可能导致未经授权访问Windows虚拟机。

英文描述:

pwn.college DOJO is an education platform for learning cybersecurity. In versions up to and including commit 781d91157cfc234a434d0bab45cbcf97894c642e, the /workspace endpoint contains an improper authentication vulnerability that allows an attacker to access any active Windows VM without proper authorization. The vulnerability occurs in the view_desktop function where the user is retrieved via a URL parameter without verifying that the requester has administrative privileges. An attacker can supply any user ID and arbitrary password in the request parameters to impersonate another user. When requesting a Windows desktop service, the function does not validate the supplied password before generating access credentials, allowing the attacker to obtain an iframe source URL that grants full access to the target user's Windows VM. This impacts all users with active Windows VMs, as an attacker can access and modify data on the Windows machine and in the home directory of the associated Linux machine via the Z: drive. This issue has been patched in commit 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef. No known workarounds exist.

CWE类型:
CWE-287
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
pwncollege dojo < 467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef - - cpe:2.3:a:pwncollege:dojo:<_467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/pwncollege/dojo/security/advisories/GHSA-344w-77p7-gx2c x_refsource_CONFIRM
cve.org
访问
https://github.com/pwncollege/dojo/commit/467db0b9ea0d9a929dc89b41f6eb59f7cfc68bef x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
CRITICAL
9.5
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L
机密性
HIGH
完整性
HIGH
可用性
LOW
后续系统影响 (Subsequent):
机密性
HIGH
完整性
HIGH
可用性
LOW
时间信息
发布时间:
2025-10-14 21:58:27
修改时间:
2025-10-15 20:11:42
创建时间:
2025-11-11 15:40:48
更新时间:
2025-11-11 16:00:16
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62376 2025-11-11 15:23:33 2025-11-11 07:40:48
NVD nvd_CVE-2025-62376 2025-11-11 15:01:06 2025-11-11 07:48:35
CNNVD cnnvd_CNNVD-202510-1717 2025-11-11 15:12:59 2025-11-11 08:00:16
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:16
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-202510-1717; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-202510-1717
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:35
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']