We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9e97feb commit 88bb2e2Copy full SHA for 88bb2e2
modules/exploits/unix/fileformat/imagemagick_delegate.rb
@@ -21,8 +21,9 @@ def initialize(info = {})
21
a .png (for example) which is actually a crafted SVG (for example) that
22
triggers the command injection.
23
24
- Tested on Linux, BSD, and OS X. You'll want to choose your payload
25
- carefully due to portability concerns. Use cmd/unix/generic if need be.
+ The PostScript (PS) target leverages a Ghostscript -dSAFER bypass
+ (discovered by taviso) to achieve RCE in the Ghostscript delegate.
26
+ Ghostscript versions 9.18 and later are affected.
27
28
If ImageMagick supports popen(), a |-prefixed command will be used for
29
the exploit. No delegates are involved in this exploitation.
0 commit comments