目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2019-14287 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Sudo 输入验证错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 sudo 1.8.28之前版本中存在安全漏洞。攻击者可利用该漏洞以root权限运行命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2019-14287 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/FauxFaux/sudo-cve-2019-14287POC详情
2This is a container built for demonstration purposes that has a version of the sudo command which is vulnerable to CVE-2019-14287https://github.com/CashWilliams/CVE-2019-14287-demoPOC详情
3Sudo exploithttps://github.com/n0w4n/CVE-2019-14287POC详情
4Nonehttps://github.com/gurneesh/CVE-2019-14287-write-upPOC详情
5Sudo Security Bypass (CVE-2019-14287)https://github.com/shallvhack/Sudo-Security-Bypass-CVE-2019-14287POC详情
6Nonehttps://github.com/huang919/cve-2019-14287-PPTPOC详情
7cve-2019-14287https://github.com/wenyu1999/sudo-POC详情
8Nonehttps://github.com/Sindadziy/cve-2019-14287POC详情
9Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.https://github.com/CMNatic/Dockerized-CVE-2019-14287POC详情
10Sudo Vulnerability CVE-2019-14287https://github.com/axax002/sudo-vulnerability-CVE-2019-14287POC详情
11Documentation for Sudo Security Bypass - CVE 2019-14287https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287POC详情
12Sudo Security Policy bypass Vulnerabilityhttps://github.com/HussyCool/CVE-2019-14287-IT18030372-POC详情
13Nonehttps://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287POC详情
14This is a brief exploitation of CVE-2019-14287 Sudo Security Bypass Vulnerability. https://github.com/ejlevin99/Sudo-Security-Bypass-VulnerabilityPOC详情
15This is the exploitation of sudo security bypass vulnerabilityhttps://github.com/thinuri99/Sudo-Security-Bypass-Vulnerability-CVE-2019-14287-POC详情
16Nonehttps://github.com/janod313/-CVE-2019-14287-SUDO-bypass-vulnerabilityPOC详情
17Nonehttps://github.com/DewmiApsara/CVE-2019-14287POC详情
18Scripts to verify and execute CVE-2019-14287 as part of Researchhttps://github.com/M108Falcon/Sudo-CVE-2019-14287POC详情
19Nonehttps://github.com/edsonjt81/CVE-2019-14287-POC详情
20CVE-2019-14287https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-RightsPOC详情
21Nonehttps://github.com/crypticdante/CVE-2019-14287POC详情
22Nonehttps://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287POC详情
23Nonehttps://github.com/5l1v3r1/cve-2019-14287sudoexpPOC详情
24Nonehttps://github.com/MariliaMeira/CVE-2019-14287POC详情
25Nonehttps://github.com/Ijinleife/CVE-2019-14287POC详情
26Nonehttps://github.com/H3xL00m/CVE-2019-14287POC详情
27Nonehttps://github.com/n3ov4n1sh/CVE-2019-14287POC详情
28Nonehttps://github.com/c0d3cr4f73r/CVE-2019-14287POC详情
29Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2019-14287POC详情
30Nonehttps://github.com/0xwh1pl4sh/CVE-2019-14287POC详情
31Nonehttps://github.com/N3rdyN3xus/CVE-2019-14287POC详情
32Nonehttps://github.com/NyxByt3/CVE-2019-14287POC详情
33Nonehttps://github.com/lemonadern/poc-cve-2019-14287POC详情
34Nonehttps://github.com/h3xcr4ck3r/CVE-2019-14287POC详情
35Nonehttps://github.com/n3rdh4x0r/CVE-2019-14287POC详情
36In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2019/CVE-2019-14287.yamlPOC详情
37Nonehttps://github.com/h3x0v3rl0rd/CVE-2019-14287POC详情
38Documentation for Sudo Security Bypass - CVE 2019-14287https://github.com/sachinthadesilva/Exploit-CVE-2019-14287POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2019-14287 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-14287

暂无评论


发表评论