POC详情: 7f802fbbccf5ae457c451319e2887bcd89636c69

来源
关联漏洞
标题: ImageMagick 安全漏洞 (CVE-2022-44268)
描述:ImageMagick是美国ImageMagick公司的一套开源的图像处理软件。该软件可读取、转换或写入多种格式的图片。 ImageMagick 7.1.0-49版本存在安全漏洞,该漏洞源于存在信息泄露漏洞,当它在解析PNG图像时生成的图像可能会嵌入任意文件内容。
描述
Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read
介绍
# auto-cve-2022-44268
![banner.png](banner.png)

Automating exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read

Original finding: https://www.metabaseq.com/imagemagick-zero-days/

PoC Repository: https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC

# Description
ImageMagick will **interpret** the "profile" text string** as a filename** and **will load the content** as a raw profile, then **the attacker can download** the resized image **which will come with the content of a remote file.**

## Vulnerability & Exploitation summary
🔴 Take a PNG file, add a file path to the "profile" EXIF field, send it to a website using an affected version of ImageMagick, it interprets the file path, load its content into the EXIF field, you download the image, extract the HEX data in the "Raw Profile Type" field, and convert it to ASCII to read the remote file.

Affected versions: ImageMagick 7.1.0-49 

# Requirements
```bash
sudo apt install pngcrush imagemagick exiftool exiv2 -y
```

# Usage
	wget https://github.com/narekkay/auto-cve-2022-44268.sh/releases/download/auto-cve-2022-44268.sh/auto-cve-2022-44268.sh
	wget https://github.com/narekkay/auto-cve-2022-44268.sh/releases/download/auto-cve-2022-44268.sh/flag.png
 	chmod +x auto-cve-2022-44268.sh
 	./auto-cve-2022-44268.sh <image name> <file to read>

# Example
	./auto-cve-2022-44268.sh flag.png /etc/passwd

# Demo
https://github.com/narekkay/autoexploit-cve-2022-44268/assets/24856100/cd5719e5-6eae-4544-b4dc-719b1182018d

# Enumeration Tips
Once you get users from /etc/passwd, try to enumerate SSH private keys from /home/.ssh/<user>/ :
- id_rsa
- id_ecdsa
- id_ed25519
e.g /home/john/.ssh/id_ed25519

Don't forget :
- config files for known CMS like wp-config.php for Wordpress
- Virtual Hosts enumeration like /etc/apache2/sites-available/000-default.conf,
- or .env files for instances

### Tags
imagemagick, exploit, vuln, magick convert, magick resize, exploitation, vulnerabilities, file read, CVE-2022-44268
文件快照

[4.0K] /data/pocs/7f802fbbccf5ae457c451319e2887bcd89636c69 ├── [1.6K] auto-cve-2022-44268.sh ├── [101K] banner.png ├── [5.5M] demo_auto-cve-2022-44268.mp4 ├── [1.2K] flag.png └── [2.0K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。