Home Cyber Crime PoC released for Ghostscript vulnerability that exposed Airbnb, Dropbox

PoC released for Ghostscript vulnerability that exposed Airbnb, Dropbox


Server-side picture conversion assault vector laid naked

Proof of concept exploit code has been released that targets a recently disclosed Ghostscript vulnerability

Hackers have launched proof-of-concept code that exploits a not too long ago demonstrated vulnerability in older however nonetheless broadly used variations of Ghostscript, the favored server-side picture conversion software program package deal.

Safety researcher Emil Lerner demonstrated an unpatched vulnerability for Ghostscript model 9.50 on the ZeroNights X convention in Saint Petersburg, Russia final month.

The discovering was demonstrated utilizing ImageMagick, a free and open source cross-platform software program for file conversion, on Ubuntu.

Catch up with the latest cybersecurity research news

Throughout his discuss, Lerner defined how he was in a position to leverage his discovery to hack into the techniques of Airbnb, Dropbox, and the Yandex.Realty app – gathering varied bug bounties within the course of.

There are a few completely different methods at play. The Airbnb exploit, for instance, makes use of server-side request forgery (SSRF) to trigger a reminiscence dump and steal AWS metadata.

The Dropbox assault led to remote code execution (RCE) however was restricted to a non-privileged person, limiting its efficiency. Researchers escalated the scope of their exploit by inflicting Python to import their script when triggering an exception.

The final exploit makes use of SVG (scalable vector graphics) to import itself as an EPI file, which is processed by Ghostscript and permits an attacker to inject arbitrary instructions.

Sensible Magick

A proof-of-concept Python script focusing on the Ghostscipt vulnerability and utilizing ImageMagick with the default settings from the favored Ubuntu Linux distribution was posted on GitHub final weekend.

The Each day Swig approached Lerner, the hacker who posted the proof-of-concept script, and Artifex, the builders and entrepreneurs of Ghostscript, for remark. This text can be up to date when extra info comes at hand.

The newest obtainable model of Ghostscript is 9.54, launched again in March 2021. The corpus of the analysis reveals that Many web sites run outdated software program, leaving them open to exploitation consequently.

YOU MAY ALSO LIKE Raider: A tool to test authentication in web applications

Source link