Skip to content

This exploit targets CVE-2019-14811 in GS environments where PostScript output is not reflected, but is executed such as PDF previews via png images.

Notifications You must be signed in to change notification settings

matejsmycka/CVE-2019-14811-in-pdf-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-14811 GhostScript PDF preview Exploit PoC

This exploit targets CVE-2019-14811 in GS environments where PostScript output is not reflected, but is executed such as PDF previews via png images.

Exploit renders commands directly in (pngXXm) preview, it is based on https://github.com/hhc0null/GhostRule/blob/master/ghostrule1.ps.

The dSafer flag gets overridden to allow execution of arbitrary commands using .forceput via .pdf_hook_DSC_Creator. See screenshot below.

Showcase

About

This exploit targets CVE-2019-14811 in GS environments where PostScript output is not reflected, but is executed such as PDF previews via png images.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published