POC详情: f7a74b85554b13294ac072be1151e850202ed261

来源
关联漏洞
标题: exiftool 操作系统命令注入漏洞 (CVE-2022-23935)
描述:exiftool是一个应用软件。使元数据更易于访问。 exiftool 12.38 之前存在操作系统命令注入漏洞,该漏洞源于 lib/Image/ExifTool.pm 错误处理 $file =~ /|$/ 检查。
介绍
# CVE-2022-23935
The Exiftool software program, in versions prior to 12.38, has a security vulnerability that can be exploited through a specially crafted filename. 

This vulnerability allows for command injection, where an attacker can execute arbitrary commands on the system by appending a pipe character '|' to the end of the filename, causing the file to be treated as a command to be executed rather than as a regular file. 

As a result, any file on the system that has this naming convention can be potentially used to execute malicious code.
文件快照

[4.0K] /data/pocs/f7a74b85554b13294ac072be1151e850202ed261 ├── [1.5K] CVE-2022-23935.py └── [ 552] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。