Python PIL 远程命令执行漏洞
CVE-2017-8291
【原理】
【工具】
【步骤】
➜ cd /Users/harveysn0w/Documents/CVE-2017-8291/env
➜ env ls
app.py docker-compose.yml
➜ docker-compose up -d
Creating network "env_default" with the default driver
Pulling web (vulhub/ghostscript:9.21-with-flask)...
9.21-with-flask: Pulling from vulhub/ghostscript
7919f5b7d602: Pull complete
c6c44661db59: Pull complete
9c50e2687d10: Pull complete
27869d33eb7b: Pull complete
e228e686e2b9: Pull complete
a3ed95caeb02: Pull complete
Digest: sha256:4e42c01b5f0670f845cdc4c2a76a1f6baa965d58184e2e040a5c635fd7059654
Status: Downloaded newer image for vulhub/ghostscript:9.21-with-flask
Creating env_web_1 ... done
➜ env






exp&poc
关闭镜像(每次用完后关闭)
最后更新于