7.8
CVSSv3

CVE-2022-23935

Published: 25/01/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 677
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

lib/Image/ExifTool.pm in ExifTool prior to 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

exiftool project exiftool

Vendor Advisories

lib/Image/ExifToolpm in ExifTool before 1238 mishandles a $file =~ /\|$/ check (CVE-2022-23935) ...

Github Repositories

🐍 Python Exploit for CVE-2022-23935

CVE-2022-23935 🐍 Python Exploit for CVE-2022-23935 Staged Reverse Shell Payload Generator for CVE-2022-23935 Example cve-2022-23935 1010163 44444 Usage usage: cve-2022-23935 [-h] [-l SERVER_PORT] [-s SHELL] ip port positional arguments: ip IP Address/Host for Callback port Port Number for Cal

CVE-2022-23935 exploit PoC exiftool version 12.37 written in python

Introduction CVE-2022-23935 exploit PoC exiftool version 1237 Installation git clone githubcom/0xFTW/CVE-2022-23935 cd CVE-2022-23935 chmod +x CVE-2022-23935py pip3 install pwntools Usage /CVE-2022-23935 <IP> <PORT>