webmedium

Магическая камера 3000 (MagCam 3000) — HackerLab

hackerlab

Task: Web app processes PNG uploads with ImageMagick. Solution: Exploited CVE-2022-44268 by injecting tEXt chunk with profile path to read /etc/passwd, extracted hex-encoded flag from output image metadata.

$ ls tags/ techniques/
cve_exploitationpng_chunk_injectionmetadata_exfiltration

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]