-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It doesn't work ;-? #2
Comments
The same issue, doesn't work |
For me this exploit worked perfectly. Double check all the params and in my case what mostly killed this exploit are the Imagick libraries which weren't installed on the server or not the default setup. |
What's the imagick default setup? I'm using the wordpress docker envrionment,and always failed to read the remote explot_XX.svg(the ftp setup is right), the log error is as bellow:
|
try |
one thing I cannot understand though is why we keep trying to get
|
after |
It is hard to help without seeing your config... For the starter, you can post your dockerfile/docker-compose and phpinfo here... |
Here is the phpinfo() |
Also, have you checked your /tmp folder for magick-*? do |
|
the above steps seems no problem:
I'll try with your docker-compose.yaml. |
Well, it seems imagick is all set... Try to use my docker-compose file amd let me know if the issue still persists. In my config, imagemagick is < 7.0.0. I know that in >7.0.7 or 7.1.0 they've patched some widely exploited vulns. |
Thanks @N00BIER, your docker compose file works. |
I only get this output:
[-] Checking arguments
[-] All arguments for exploiting target are set, beginning the first checks
[-] The remote FTP polyglot SVG/MSL file is reachable
[-] The remote FTP polyglot SVG/MSL file ending with [0] is reachable
[-] A sample remote FTP exploiter VID test file is reachable
[-] A sample Remote FTP exploiter VID test file ending with [0] is reachable
[-] The remote Exploit PNG/PHP file is reachable
[!] All arguments have been checked correctly, lauching exploitation
[-] Lauching 100 Threads on long SVG
[-] Waiting 5 second for the file to be created
[-] Starting Bruteforcing with VID exploiters
[-] Checking the drop of pwned.php
[!] Not yet, try 1 on 9 ... checking again in 10 seconds
[!] Not yet, try 2 on 9 ... checking again in 10 seconds
[!] Not yet, try 3 on 9 ... checking again in 10 seconds
[!] Not yet, try 4 on 9 ... checking again in 10 seconds
[!] Not yet, try 5 on 9 ... checking again in 10 seconds
[!] Not yet, try 6 on 9 ... checking again in 10 seconds
[!] Not yet, try 7 on 9 ... checking again in 10 seconds
[!] Not yet, try 8 on 9 ... checking again in 10 seconds
[!] Not yet, try 9 on 9 ... checking again in 10 seconds
[!] Exploit has not worked, try by increase concurrency value or use another method
Not able to reproduce it .. what I'm doing wrong ?
The text was updated successfully, but these errors were encountered: