webPromedium
Lab 345 — PrintForge — RCE via Ghostscript Command Injection
hackadvisor
Task: Document conversion platform using Ghostscript with -dNOSAFER to convert EPS/PS to PDF. Solution: craft a malicious EPS file using PostScript's %pipe% read operator to execute shell commands and render flag file contents as text in the generated PDF.
$ ls tags/ techniques/
honeypot_flag_detectionghostscript_pipe_command_executionpostscript_file_operator_rcenosafety_misconfiguration_exploitpdf_conversion_pipeline_abuse
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 116 — InsightForge — IDOR via Undocumented Internal API— hackadvisor
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor
- [web][Pro]BillForge— hackadvisor
- [web][Pro]Lab 58 — ReportForge — SSRF via PDF Export Logo URL— hackadvisor
- [web][Pro]Lab 13 — WebForge — Insecure Deserialization in Config Import— hackadvisor