Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1010174 PoC — CImg Library 命令注入漏洞

Source
Associated Vulnerability
Title:CImg Library 命令注入漏洞 (CVE-2019-1010174)
Description:CImg Library是一款用于图像处理的开源C++库。 CImg The CImg Library 2.3.3及之前版本中的‘load_network()’函数存在命令注入漏洞。该漏洞源于外部输入数据构造可执行命令过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞执行非法命令。
Description
 CImg Library v.2.3.3 - command injection
Readme
# CVE-2019-1010174

 CImg Library v.2.3.3 - command injection
 
CVE-2019-1010174 Detail
Modified
This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.

Description
CImg The CImg Library v.2.3.3 and earlier is affected by: command injection. The impact is: RCE. The component is: load_network() function. The attack vector is: Loading an image from a user-controllable url can lead to command injection, because no string sanitization is done on the url. The fixed version is: v.2.3.4.


![CVE-2019-1010174](https://raw.githubusercontent.com/NketiahGodfred/CVE-2019-1010174/main/CVE-2019-1010174.png)
File Snapshot

[4.0K] /data/pocs/fcdabe7cb070f9b75cb5a6798c77f43b45210996 ├── [125K] CVE-2019-1010174.png ├── [1.1K] exploit.sh └── [ 713] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.