DirtyPipe (CVE-2022-0847) 是自 5.8 以来 Linux 内核中的一个漏洞,它允许覆盖任意只读文件中的数据。
相关链接:
https://dirtypipe.cm4all.com/
https://haxx.in/files/dirtypipez.c
地址:
https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit
说明
What is this
This is Max Kellermann's exploit POC for DirtyPipe, but modified to overwrite root's password field in /etc/passwd and restore after popping a shell.
How to use this
Run
./compile.sh
then./exploit
and it'll pop a root shell.su: must be run from a terminal
- If you get this error message, login as
root
with the passwordaaron
.- Then, restore
/etc/passwd
by runningmv /tmp/passwd.bak /etc/passwd
(oops sorry my laptop battery is dying and my charger broke so I don't have time to fix this the right now, sorry)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论