ImaegMagick Code Execution (CVE-2016-3714)# CVE-2016-3714
ImageMagick Code Execution (CVE-2016-3714)<br/>
<br/>
imagick_builder.py = Simple Payload Builder to Exploit CVE-2016-3714<br/>
imagick_bypass_shell.php = PHP based web shell leveraging the PHP imagick extension wrapper to bypass disabled functions<br/>
<br/>
Few Images of things working:<br/>
Payload Builder:<br/>
<img src="http://i.imgur.com/NIfEgvp.png"><br/>
imagick payload vs vBulletin 4.x w/ImageMagick Enabled:<br/>
<img src="http://i.imgur.com/BNRIaSw.png"><br/>
server side after payload triggers:<br/>
<img src="http://i.imgur.com/IYvPbfx.png"><br/>
<br/>
<br/>
Web Shell:<br/>
Command Execution:<br/>
<img src="http://i.imgur.com/tZtJX7l.png"><br/>
File Read:<br/>
<img src="http://i.imgur.com/lAwTrb1.png"><br/>
<br/>
<br/>
[4.0K] /data/pocs/977852d46a44f2f38f9b2d3406673e760bbc198d
├── [4.0K] classes
│ ├── [ 11K] colors.py
│ ├── [ 11K] colors.pyc
│ ├── [ 0] __init__.py
│ └── [ 137] __init__.pyc
├── [ 11K] imagick_builder.py
├── [6.2K] imagick_bypass_shell.php
└── [ 755] README.md
1 directory, 7 files