Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-28368 PoC — Dompdf 跨站脚本漏洞

Source
Associated Vulnerability
Title:Dompdf 跨站脚本漏洞 (CVE-2022-28368)
Description:Dompdf是一个 HTML 到 PDF 的转换器。 Dompdf 1.2.1 版本存在跨站脚本漏洞,该漏洞允许通过@font-face级联样式表(CSS)语句的src:url字段中的.php文件远程执行代码。
Description
This repository contains a python script that will handle the majority of the dompdf cached font exploit (CVE-2022-28368), all you need to do is create the request
Readme
# CVE-2022-28368-handler
This repository contains a python script that will handle the majority of the dompdf cached font exploit (CVE-2022-28368), all you need to do is create the request. It will even provide a trigger string to start the exploit :)

## Usage
```
usage: CVE-2022-28368.py [-h] -d DOMPDF_LOCATION [-f FONTNAME] -i HTTP_IP [-p HTTP_PORT] [-P PHP] [-w] [-r]

This script handles the majority of the dompdf cached font exploit (CVE-2022-28368), all you need to do is create the request

optional arguments:
  -h, --help            show this help message and exit
  -d DOMPDF_LOCATION, --dompdf-location DOMPDF_LOCATION
                        dompdf location on target webserver (example: http://target.com/vendor/dompdf)
  -f FONTNAME, --fontname FONTNAME
                        Exploit font name (default: expfont.php)
  -i HTTP_IP, --http-ip HTTP_IP
                        HTTP listener IP
  -p HTTP_PORT, --http-port HTTP_PORT
                        HTTP listener PORT (default: 80)
  -P PHP, --php PHP     PHP to execute (default: <?php system("whoami"); ?>)
  -w, --webshell        Spawn web shell
  -r, --revshell        Spawn reverse shell (Uses HTTP listener IP and port 9001 by default)
```
### See for technical details of the vulnerability:
https://positive.security/blog/dompdf-rce
https://github.com/positive-security/dompdf-rce
File Snapshot

[4.0K] /data/pocs/3492e4c7857abc826b47e4fc841dd01a84aacc81 ├── [4.3K] CVE-2022-28368.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.