POC详情: cc93adc3e392dd14dca8d8935adfdf8eea02d274

来源
关联漏洞
标题: Pillow 安全漏洞 (CVE-2022-22817)
描述:Pillow是一款基于Python的图像处理库。 Pillow 9.0.0 之前存在安全漏洞,该漏洞源于 PIL.ImageMath.eval 允许评估任意表达式,例如使用 Python exec 方法的表达式。
描述
Example of CVE-2022-22817 
介绍
# Intro
`PIL.ImageMath.eval()` Evaluate expression in the given environment.
For example:
```math
a * 2
```
We can use this to take RCE so easy if the target uses `PIL.ImageMath.eval` in Pillow before 9.0.0

# PoC
Instead using `ImageMath.eval()` for math opreations, we may insert `exec()` like this 
```python
ImageMath.eval("exec(exit())")
```
it will execute what's inside right away

# Support
If you would like to support me with donation, I recommend you to give it to someone who really need it please. If you do so then consider that i earned your support.

<a href="https://www.buymeacoffee.com/jawadpy" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-green.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" ></a>
文件快照

[4.0K] /data/pocs/cc93adc3e392dd14dca8d8935adfdf8eea02d274 └── [ 784] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。