code-scan starred RCE-0-day-for-GhostScript-9.50
2021-09-28 16:55:19
Author: github.com(查看原文)
阅读量:23
收藏
PoC for RCE 0-day for GhostScript 9.50 - Payload generator
The PoC in python generates payload when exploited for a 0-day of GhostScript 9.50. This 0-day exploit affect to ImageMagick with the default settings from Ubuntu repository (Tested with default settings of ImageMagick on Ubuntu 20.04)
This project is created only for educational purposes and cannot be used for law violation or personal gain.
The author of this project is not responsible for any possible harm caused by the materials of this project.
Usage: python IM-RCE-via-GhostScript-9.5.py <CMD> <Exploit-File>
Demo
Noted for php-imagemagick, sometime you must find the correct fd/<number>
. The easiest way for doing this stuff is fuzzylogic and something like this (Tested with Ubuntu 20.04 and default php-imagemagick installed).
文章来源: https://github.com/duc-nt/RCE-0-day-for-GhostScript-9.50
如有侵权请联系:admin#unsafe.sh