I don't found an example of POC for this CVE of ruby-arr-pm 0.0.11, so I build one using a Docker container.
- Arbitrary shell execution when extracting or listing files contained in a malicious rpm. (CVE-2022-39224)
- PentesterLab > CVE-2022-39224
$ docker build -t cve-2022-39224:poc . && docker run -it cve-2022-39224:poc