ImageMagick Code Execution (CVE-2016-3714)
imagick_builder.py = Simple Payload Builder to Exploit CVE-2016-3714
imagick_bypass_shell.php = PHP based web shell leveraging the PHP imagick extension wrapper to bypass disabled functions
Few Images of things working:
Payload Builder:
imagick payload vs vBulletin 4.x w/ImageMagick Enabled:
server side after payload triggers:
Web Shell:
Command Execution:
File Read: