DirtyPipe (CVE-2022-0847) 是自 5.8 以来 Linux 内核中的一个漏洞,它允许覆盖任意只读文件中的数据。
相关链接:
https://dirtypipe.cm4all.com/
https://haxx.in/files/dirtypipez.c
地址:
https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit
说明
What is this
This is Max Kellermann's exploit POC for DirtyPipe, but modified to overwrite root's password field in /etc/passwd and restore after popping a shell.
How to use this
Run
./compile.sh
then./exploit
and it'll pop a root shell.su: must be run from a terminal
- If you get this error message, login as
root
with the passwordaaron
.- Then, restore
/etc/passwd
by runningmv /tmp/passwd.bak /etc/passwd
(oops sorry my laptop battery is dying and my charger broke so I don't have time to fix this the right now, sorry)
特别标注:
本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
- 我的微信
- 微信扫一扫
-
- 我的微信公众号
- 微信扫一扫
-
评论