Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-3714

Description

The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."

POC

Reference

- http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html

- http://www.openwall.com/lists/oss-security/2016/05/03/13

- http://www.openwall.com/lists/oss-security/2016/05/03/18

- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

- http://www.ubuntu.com/usn/USN-2990-1

- https://imagetragick.com/

- https://www.exploit-db.com/exploits/39767/

- https://www.exploit-db.com/exploits/39791/

- https://www.imagemagick.org/script/changelog.php

- https://www.kb.cert.org/vuls/id/250519

Github

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ArtemCyberLab/Project-Exploitation-of-the-Magician-Spring-Boot-Application

- https://github.com/Aukaii/notes

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Fa1c0n35/Web-CTF-Cheatshee

- https://github.com/Ghebriou/platform_pfe

- https://github.com/GhostTroops/TOP

- https://github.com/HoangKien1020/PoC-Collection

- https://github.com/Hood3dRob1n/CVE-2016-3714

- https://github.com/HugoAPortela/Criando-Agente-Deteccao-Vulnerabilidades-Arquiteturas

- https://github.com/ImageTragick/PoCs

- https://github.com/JERRY123S/all-poc

- https://github.com/JoshMorrison99/CVE-2016-3714

- https://github.com/LeCielBleu/SecurityDocs

- https://github.com/MR-lover/test

- https://github.com/MaaxGr/MaaxGr

- https://github.com/Macr0phag3/Exp-or-Poc

- https://github.com/Mealime/carrierwave

- https://github.com/MrrRaph/pandagik

- https://github.com/NCSU-DANCE-Research-Group/CDL

- https://github.com/PandH4cker/pandagik

- https://github.com/RClueX/Hackerone-Reports

- https://github.com/SecZetta/carrierwave

- https://github.com/SexyBeast233/SecBooks

- https://github.com/SgtMate/container_escape_showcase

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/XATELO/badmeta

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/YgorAlberto/Ethical-Hacker

- https://github.com/YgorAlberto/ygoralberto.github.io

- https://github.com/ZTK-009/collection-document

- https://github.com/Zxser/Web-CTF-Cheatsheet

- https://github.com/abhinav-1050/carrierwave

- https://github.com/artfreyr/wp-imagetragick

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/barrracud4/image-upload-exploits

- https://github.com/carrierwaveuploader/carrierwave

- https://github.com/christophervojick119/carrierwave

- https://github.com/chusiang/CVE-2016-3714.ansible.role

- https://github.com/cobwebkanamachi/ImageMagick-how2fix-jessie-

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/dai5z/LBAS

- https://github.com/dazralsky/carrierwave

- https://github.com/dr-natetorious/book-Fuzz_Testing

- https://github.com/duckstroms/Web-CTF-Cheatsheet

- https://github.com/eeenvik1/kvvuctf_26.04

- https://github.com/f3l3p1n0/f3l3p1n0

- https://github.com/framgia/carrierwave

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/gipi/cve-cemetery

- https://github.com/heckintosh/modified_uploadscanner

- https://github.com/hecticSubraz/Network-Security-and-Database-Vulnerabilities

- https://github.com/hktalent/TOP

- https://github.com/imhunterand/hackerone-publicy-disclosed

- https://github.com/jackdpeterson/imagick_secure_puppet

- https://github.com/jbmihoub/all-poc

- https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell

- https://github.com/landlock-lsm/workshop-imagemagick

- https://github.com/laursisask/repo-18

- https://github.com/libreops/librenet-ansible

- https://github.com/lnick2023/nicenice

- https://github.com/mengdaya/Web-CTF-Cheatsheet

- https://github.com/mmomtchev/magickwand.js

- https://github.com/modzero/mod0BurpUploadScanner

- https://github.com/morningphase/FG-CIBGC

- https://github.com/morningphase/lbas

- https://github.com/mrhacker51/FileUploadScanner

- https://github.com/mrhenrike/Hacking-Cheatsheet

- https://github.com/navervn/modified_uploadscanner

- https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document

- https://github.com/padok-team/dojo-kubernetes-security

- https://github.com/padok-team/formation-lab-kube-secu

- https://github.com/password520/collection-document

- https://github.com/pwnosec/CTF-Cheatsheet

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/raphaeltheban/Ethical-Hacker

- https://github.com/rebujacker/CVEPoCs

- https://github.com/ruslanemrahov/Web_Pentest

- https://github.com/sardine-web/File-Upload

- https://github.com/shelld3v/RCE-python-oneliner-payload

- https://github.com/silentsignal/burp-image-size

- https://github.com/snyk-labs/container-breaking-in-goof

- https://github.com/stuffedmotion/mimemagic

- https://github.com/superfish9/pt

- https://github.com/ternpixel/mimemagic

- https://github.com/tom0li/collection-document

- https://github.com/tommiionfire/CVE-2016-3714

- https://github.com/vulnbank/vulnbank

- https://github.com/w181496/Web-CTF-Cheatsheet

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/wpbnk/vulnbankfix

- https://github.com/xbl3/awesome-cve-poc_qazbnm456