Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-4510 PoC — Binwalk 路径遍历漏洞

Source
Associated Vulnerability
Title:Binwalk 路径遍历漏洞 (CVE-2022-4510)
Description:Binwalk是ReFirm Labs开源的一种快速、易于使用的工具。用于分析、逆向工程和提取固件图像。 ReFirm Labs Binwalk 2.1.2b版本至2.3.2版本存在路径遍历漏洞,该漏洞源于存在路径遍历,通过制作恶意PFS文件系统文件,攻击者可以在任意位置提取文件。
Description
Python script that generates pfs payloads to exploit CVE-2022-4510
Readme
# BadPfs
Python script that generates pfs payloads to exploit CVE-2022-4510

Simply create a pfs payload using the script. When binwalk is run with -e on the payload, a file can be overwritten with the permission of binwalk.

This example will overwrite /etc/sudoers with the contents of ./data when it is opened with -e through binwalk. This is a great way to privesc.
```
# python3 BadPfs.py --out=payload.pfs --data=./data --target=/etc/sudoers
```
File Snapshot

[4.0K] /data/pocs/b76526af49368b28e2b5f668ba17fe9058c52715 ├── [ 888] BadPfs.py └── [ 452] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.