xmtxsec / CVE-2021-3156-plus

CVE-2021-3156非交互式执行命令

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2021-3156

2021-02-10-02-18-07

This is a warehouse modification based on @CptGibbon and supports arbitrary command execution.

相关阅读:CVE-2021-3156 - Exploit修改

Root shell PoC for CVE-2021-3156 (no bruteforce)

For educational purposes etc.

Tested on :

  • @CptGibbon Ubuntu 20.04 against sudo 1.8.31
  • @Rvn0xsy Ubuntu 17.10

All research credit: Qualys Research Team Check out the details on their blog.

You can check your version of sudo is vulnerable with: $ sudoedit -s Y. If it asks for your password it's most likely vulnerable, if it prints usage information it isn't. You can downgrade to the vulnerable version on Ubuntu 20.04 for testing purposes with $ sudo apt install sudo=1.8.31-1ubuntu1

Usage

$ make

$ ./exploit "Command"

About

CVE-2021-3156非交互式执行命令


Languages

Language:C 94.8%Language:Makefile 5.2%