-
Notifications
You must be signed in to change notification settings - Fork 264
Full poc for CVE-2025-53367 #899
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Full poc for CVE-2025-53367 #899
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This pull request introduces a sophisticated proof-of-concept exploit for CVE-2025-53367 that achieves code execution through the DjVuLibre vulnerability. The PR adds a complete exploit implementation that bypasses ASLR and demonstrates execution of arbitrary shell commands in PDF viewers like evince/papers.
- Replaces a simple crash-only proof-of-concept with a full code execution exploit
- Adds a comprehensive patch file that modifies the DjVuLibre codebase to generate exploit files
- Provides detailed build and usage instructions for different Linux distributions
Reviewed Changes
Copilot reviewed 2 out of 4 changed files in this pull request and generated 4 comments.
File | Description |
---|---|
README.md | Updates documentation with complete exploit instructions, build process, and usage examples for Ubuntu 24.04/25.04 |
DjVuLibre-poc-CVE-2025-53367.diff | Adds large patch file (1883 lines) containing the complete exploit implementation including heap manipulation and ROP chains |
SecurityExploits/DjVuLibre/MMRDecoder_scanruns_CVE-2025-53367/README.md
Outdated
Show resolved
Hide resolved
SecurityExploits/DjVuLibre/MMRDecoder_scanruns_CVE-2025-53367/DjVuLibre-poc-CVE-2025-53367.diff
Show resolved
Hide resolved
+ if (n % 4 != 0) { | ||
+ G_THROW(ERR_MSG("wipe_bytes_at_dst: n is not a multiple of 4")); | ||
+ } | ||
+ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Function lacks documentation explaining its purpose, parameters, and behavior. This is a complex security-critical function that should have clear documentation.
Copilot uses AI. Check for mistakes.
+ | ||
+ // skip | ||
+ write_stop(packer, lineno, stop); | ||
+ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Function lacks documentation explaining its purpose and parameters. Given the complexity of this exploit function, comprehensive documentation is essential.
Copilot uses AI. Check for mistakes.
The first copilot suggestion about a missing space should probably be implemented |
Add the poc that achieves code execution.