Skip to content

narekkay/auto-cve-2022-44268.sh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

auto-cve-2022-44268

banner.png

Automating exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read

Original finding: https://www.metabaseq.com/imagemagick-zero-days/

PoC Repository: https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC

Description

ImageMagick will interpret the "profile" text string** as a filename** and will load the content as a raw profile, then the attacker can download the resized image which will come with the content of a remote file.

Vulnerability & Exploitation summary

🔴 Take a PNG file, add a file path to the "profile" EXIF field, send it to a website using an affected version of ImageMagick, it interprets the file path, load its content into the EXIF field, you download the image, extract the HEX data in the "Raw Profile Type" field, and convert it to ASCII to read the remote file.

Affected versions: ImageMagick 7.1.0-49

Requirements

sudo apt install pngcrush imagemagick exiftool exiv2 -y

Usage

wget https://github.com/narekkay/auto-cve-2022-44268.sh/releases/download/auto-cve-2022-44268.sh/auto-cve-2022-44268.sh
wget https://github.com/narekkay/auto-cve-2022-44268.sh/releases/download/auto-cve-2022-44268.sh/flag.png
chmod +x auto-cve-2022-44268.sh
./auto-cve-2022-44268.sh <image name> <file to read>

Example

./auto-cve-2022-44268.sh flag.png /etc/passwd

Demo

demo_auto-cve-2022-44268.mp4

Enumeration Tips

Once you get users from /etc/passwd, try to enumerate SSH private keys from /home/.ssh// :

  • id_rsa
  • id_ecdsa
  • id_ed25519 e.g /home/john/.ssh/id_ed25519

Don't forget :

  • config files for known CMS like wp-config.php for Wordpress
  • Virtual Hosts enumeration like /etc/apache2/sites-available/000-default.conf,
  • or .env files for instances

Tags

imagemagick, exploit, vuln, magick convert, magick resize, exploitation, vulnerabilities, file read, CVE-2022-44268

About

Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages