exploitdb
WRITEUP
by Cristian Giustini · textlocalmultiple
https://www.exploit-db.com/exploits/51261
This is a writeup for CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick versions <= 7.1.0-49. The writeup references a PoC but does not contain exploit code itself.
Classification
Writeup 90%
Target:
ImageMagick <= 7.1.0-49
No auth needed
Prerequisites:
Rust · ImageMagick installation
nomisec
WORKING POC
276 stars
by duc-nt · poc
https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC
This PoC demonstrates an arbitrary file read vulnerability in ImageMagick (CVE-2022-44268) by embedding a target file path into a PNG image and extracting its contents via ImageMagick's processing tools. The exploit leverages PNG metadata manipulation to achieve the file read.
Classification
Working Poc 90%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
ImageMagick installed on the target system · Ability to upload or process a crafted PNG file
nomisec
STUB
217 stars
by voidz0r · poc
https://github.com/voidz0r/CVE-2022-44268
The repository only contains a README indicating the project has moved to another location. No exploit code or technical details are present.
Target:
unknown
No auth needed
nomisec
WORKING POC
52 stars
by Sybil-Scan · poc
https://github.com/Sybil-Scan/imagemagick-lfi-poc
This PoC exploits CVE-2022-44268, an information disclosure vulnerability in ImageMagick 7.1.0-49, by generating a malicious PNG file that embeds the contents of an arbitrary local file when processed by the vulnerable software.
Classification
Working Poc 95%
Target:
ImageMagick 7.1.0-49
No auth needed
Prerequisites:
ImageMagick 7.1.0-49 installed · Python with PIL and png libraries
nomisec
WORKING POC
26 stars
by kljunowsky · poc
https://github.com/kljunowsky/CVE-2022-44268
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. It allows an attacker to embed arbitrary file contents into a PNG image's metadata and later extract it, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
A vulnerable ImageMagick installation · Ability to upload a crafted PNG file to the target system
nomisec
WORKING POC
12 stars
by entr0pie · poc
https://github.com/entr0pie/CVE-2022-44268
This PoC exploits CVE-2022-44268 in ImageMagick by crafting a malicious PNG file with a tEXt chunk containing a local file path, which is then embedded into the output image during resizing operations, leading to information disclosure.
Classification
Working Poc 100%
Target:
ImageMagick v7.1.0-49
No auth needed
Prerequisites:
ImageMagick installed on the target system · Ability to upload or process a malicious PNG file
nomisec
WORKING POC
10 stars
by y1nglamore · poc
https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment
This repository provides a Docker-based testing environment for CVE-2022-44268, an arbitrary local file read vulnerability in ImageMagick. It includes a script to exploit the vulnerability by embedding file contents into PNG metadata and extracting them.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Docker environment · ImageMagick installed · pngcrush and exiv2 tools
nomisec
WORKING POC
8 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/imagemagick-CVE-2022-44268
This PoC exploits CVE-2022-44268 in ImageMagick by embedding arbitrary file paths in PNG metadata to trigger file disclosure. It includes functionality to generate malicious PNGs and parse responses to extract sensitive data.
Classification
Working Poc 90%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Ability to upload crafted PNG files to a system processing images with vulnerable ImageMagick
nomisec
SCANNER
5 stars
by jnschaeffer · poc
https://github.com/jnschaeffer/cve-2022-44268-detector
This repository contains a Go-based detector for identifying PNGs exploiting CVE-2022-44268, an ImageMagick vulnerability allowing arbitrary file reads. It scans for malicious chunks and extracts them for analysis.
Classification
Scanner 100%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Access to a malicious PNG file crafted to exploit CVE-2022-44268
nomisec
WORKING POC
4 stars
by agathanon · poc
https://github.com/agathanon/cve-2022-44268
This PoC exploits CVE-2022-44268 in ImageMagick 7.1.0-40 by embedding arbitrary file paths in PNG metadata, which can be exfiltrated when the image is processed. The craft.py script injects the path into the PNG's 'profile' metadata, and extract.py retrieves the leaked data from the processed image.
Classification
Working Poc 95%
Target:
ImageMagick 7.1.0-40
No auth needed
Prerequisites:
Python3 · Pillow library · ImageMagick 7.1.0-40 installed on target
nomisec
WORKING POC
2 stars
by chairat095 · poc
https://github.com/chairat095/CVE-2022-44268_By_Kyokito
This PoC generates a malicious PNG file that exploits CVE-2022-44268 by embedding arbitrary profile data in the image metadata. The vulnerability involves improper handling of PNG metadata in ImageMagick, leading to potential code execution when processed.
Classification
Working Poc 90%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Python environment with PIL/Pillow library · Target system processing the malicious PNG with vulnerable ImageMagick
nomisec
WORKING POC
2 stars
by narekkay · poc
https://github.com/narekkay/auto-cve-2022-44268.sh
This repository contains a bash script that automates the exploitation of CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. The script modifies a PNG file to include a file path in the 'profile' EXIF field, which when processed by a vulnerable ImageMagick instance, allows the attacker to read the contents of the specified file.
Classification
Working Poc 95%
Target:
ImageMagick 7.1.0-49
No auth needed
Prerequisites:
pngcrush · imagemagick · exiftool · exiv2
nomisec
WORKING POC
2 stars
by adhikara13 · poc
https://github.com/adhikara13/CVE-2022-44268-MagiLeak
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick, by embedding malicious PNG metadata to leak file contents. It includes utilities to generate, read, and apply profile data to PNG files.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Python 3.x · Pillow library · ImageMagick installed on target system
nomisec
WRITEUP
2 stars
by Baikuya · poc
https://github.com/Baikuya/CVE-2022-44268-PoC
This repository provides a writeup and testing methodology for CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. It describes steps to test for the vulnerability by uploading a crafted PNG file and checking for leaked data in the output.
Classification
Writeup 90%
Target:
ImageMagick (version not specified)
No auth needed
Prerequisites:
Access to upload a PNG file to a web application using ImageMagick · Ability to download the processed image · ImageMagick installed locally for verification
nomisec
WORKING POC
1 stars
by fanbyprinciple · poc
https://github.com/fanbyprinciple/ImageMagick-lfi-poc
This repository contains a functional PoC for CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick 7.1.0-49. The exploit generates a malicious PNG file with embedded metadata pointing to a local file, which is then read and exfiltrated when processed by a vulnerable ImageMagick instance.
Classification
Working Poc 95%
Target:
ImageMagick 7.1.0-49
No auth needed
Prerequisites:
Python 3 with Pillow library · ImageMagick installed on the target system · Ability to upload and process PNG files on the target
nomisec
WORKING POC
1 stars
by bhavikmalhotra · poc
https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick, by embedding malicious metadata in a PNG file. The exploit uses `pngcrush` to craft the payload and leverages the vulnerable `magick` binary to extract sensitive data from the target system.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Access to a vulnerable ImageMagick installation · Ability to upload a crafted PNG file to the target system
nomisec
STUB
1 stars
by betillogalvanfbc · poc
https://github.com/betillogalvanfbc/POC-CVE-2022-44268
The repository contains only a README.md file with minimal content, providing no functional exploit code or technical details for CVE-2022-44268.
Target:
unknown
No auth needed
nomisec
WORKING POC
by k-javaman12 · poc
https://github.com/k-javaman12/CVE-2022-44268-
This PoC exploits CVE-2022-44268 to embed and extract arbitrary file data within PNG images using zTXt chunks. It includes functionality to generate malicious PNGs and parse extracted data.
Classification
Working Poc 90%
Target:
Unknown (likely a web application or image processor vulnerable to PNG metadata manipulation)
No auth needed
Prerequisites:
Ability to upload PNG files to the target system · Target system must process PNG metadata in a vulnerable manner
nomisec
WORKING POC
by jkobierczynski · poc
https://github.com/jkobierczynski/cve-2022-44268
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick, by crafting a malicious PNG with a 'profile' text chunk containing the target filename. It automates the upload, download, and extraction of file contents via a modified Burp Suite request.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
ImageMagick with vulnerable version · Ability to upload PNG files to the target system · Burp Suite request file for the upload endpoint
nomisec
WORKING POC
by mouftan · poc
https://github.com/mouftan/CVE-2022-44268
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. It allows an attacker to embed a file path in a PNG image's metadata and retrieve the file contents when the image is processed by a vulnerable ImageMagick instance.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
A vulnerable ImageMagick instance that processes uploaded PNG images · Ability to upload a crafted PNG image to the target system
nomisec
WORKING POC
by J0ey17 · poc
https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268
This Python script automates the exploitation of CVE-2022-44268, an ImageMagick file disclosure vulnerability, by generating a malicious PNG, uploading it to a target web application, and extracting exfiltrated file content using exiftool.
Classification
Working Poc 95%
Target:
ImageMagick (specific version not specified)
No auth needed
Prerequisites:
Python 3.x · requests library · VoidZone's Rust PoC for CVE-2022-44268 · exiftool · wget
nomisec
WORKING POC
by katseyres2 · poc
https://github.com/katseyres2/CVE-2022-44268-pilgrimage
This PoC exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick, by embedding a file path in a PNG's metadata and using ImageMagick's processing to leak the file contents. The script automates the generation, upload, and decoding of the malicious PNG.
Classification
Working Poc 95%
Target:
ImageMagick v7.1.0-48 and 6.9.11-60
No auth needed
Prerequisites:
ImageMagick installed on target · Network access to upload endpoint
nomisec
WORKING POC
by FlojBoj · poc
https://github.com/FlojBoj/CVE-2022-44268
This PoC exploits CVE-2022-44268, an information disclosure vulnerability in ImageMagick 7.1.0-49. It uses `pngcrush` and `exiv2` to embed and extract arbitrary file contents (e.g., `/etc/hosts`) into/from PNG metadata.
Classification
Working Poc 95%
Target:
ImageMagick 7.1.0-49
No auth needed
Prerequisites:
pngcrush · exiv2 · exiftool · xxd · access to vulnerable ImageMagick installation
github
WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/ImageMagick-Arbitrary-File-Read (CVE-2022-44268)
The repository contains functional exploit code for CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. The PoC leverages tools like pngcrush and exiv2 to embed malicious profiles in PNG files, enabling arbitrary file reads. The code is well-structured and includes detailed usage instructions.
Classification
Working Poc 95%
Target:
ImageMagick (specific versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
ImageMagick installed on target system · ability to upload crafted PNG files
nomisec
WORKING POC
by CygnusX-26 · poc
https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC
This PoC demonstrates CVE-2022-44268, a vulnerability in ImageMagick that allows arbitrary file disclosure via crafted PNG metadata. The script embeds or extracts data from PNG files using the 'Raw profile type png' field.
Classification
Working Poc 90%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Python with PIL/Pillow library · ImageMagick installed on target system
nomisec
WORKING POC
by NataliSemi · poc
https://github.com/NataliSemi/-CVE-2022-44268
This PoC generates a PNG image with embedded metadata containing a local file path, exploiting CVE-2022-44268 in ImageMagick to achieve local file inclusion (LFI). The script uses Pillow and pypng libraries to create and manipulate the PNG file.
Classification
Working Poc 95%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Python · Pillow library · pypng library
nomisec
WORKING POC
by Vagebondcur · poc
https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268
This PoC exploits CVE-2022-44268, a vulnerability in ImageMagick, by embedding a file path in a PNG image's metadata to trigger local file inclusion (LFI). The script generates a malicious PNG file with the target file path embedded in the 'profile' metadata field.
Classification
Working Poc 90%
Target:
ImageMagick (versions affected by CVE-2022-44268)
No auth needed
Prerequisites:
Python with PIL/Pillow library · Target system with vulnerable ImageMagick version
nomisec
WORKING POC
by atici · poc
https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268
This repository contains a bash script that exploits CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. The script allows an attacker to embed a path to a file in a PNG image and later extract the contents of that file from the image.
Classification
Working Poc 95%
Target:
ImageMagick 6.9.11-60 Q16 x86_64
No auth needed
Prerequisites:
ImageMagick installed on the target system · ability to upload a crafted PNG image to the target system
nomisec
WORKING POC
by Pog-Frog · poc
https://github.com/Pog-Frog/cve-2022-44268
This PoC exploits CVE-2022-44268, an LFI vulnerability in ImageMagick versions 7.1.0-40 and below. It generates a malicious PNG file to read arbitrary files on the target system and includes a script to extract the exfiltrated data.
Classification
Working Poc 95%
Target:
ImageMagick <= 7.1.0-40
No auth needed
Prerequisites:
Python3 · Pillow library · target system running vulnerable ImageMagick
nomisec
WORKING POC
by nfm · poc
https://github.com/nfm/heroku-CVE-2022-44268-reproduction
This PoC demonstrates an arbitrary file read vulnerability in ImageMagick via crafted PNG metadata. The exploit uses `pngcrush` to embed file paths in PNG metadata, which are then exfiltrated through the `convert` command's handling of the PNG profile.
Classification
Working Poc 95%
Target:
ImageMagick (via Heroku or similar environments)
No auth needed
Prerequisites:
ImageMagick installed on the target system · Ability to upload files to the target application
nomisec
WORKING POC
by Ashifcoder · poc
https://github.com/Ashifcoder/CVE-2022-44268-automated-poc
This is a fully automated PoC for CVE-2022-44268, an arbitrary file read vulnerability in ImageMagick. It modifies a PNG file to embed arbitrary file content and then extracts it using ImageMagick tools.
Classification
Working Poc 95%
Target:
ImageMagick 6.9.11-60 Q16 x86_64
No auth needed
Prerequisites:
ImageMagick installed · exiftool · pngcrush · exiv2 · convert (ImageMagick utility)