Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-14287
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sudo 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 sudo 1.8.28之前版本中存在安全漏洞。攻击者可利用该漏洞以root权限运行命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2019-14287
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/FauxFaux/sudo-cve-2019-14287POC Details
2This is a container built for demonstration purposes that has a version of the sudo command which is vulnerable to CVE-2019-14287https://github.com/CashWilliams/CVE-2019-14287-demoPOC Details
3Sudo exploithttps://github.com/n0w4n/CVE-2019-14287POC Details
4Nonehttps://github.com/gurneesh/CVE-2019-14287-write-upPOC Details
5Sudo Security Bypass (CVE-2019-14287)https://github.com/shallvhack/Sudo-Security-Bypass-CVE-2019-14287POC Details
6Nonehttps://github.com/huang919/cve-2019-14287-PPTPOC Details
7cve-2019-14287https://github.com/wenyu1999/sudo-POC Details
8Nonehttps://github.com/Sindadziy/cve-2019-14287POC Details
9Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.https://github.com/CMNatic/Dockerized-CVE-2019-14287POC Details
10Sudo Vulnerability CVE-2019-14287https://github.com/axax002/sudo-vulnerability-CVE-2019-14287POC Details
11Documentation for Sudo Security Bypass - CVE 2019-14287https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287POC Details
12Sudo Security Policy bypass Vulnerabilityhttps://github.com/HussyCool/CVE-2019-14287-IT18030372-POC Details
13Nonehttps://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287POC Details
14This is a brief exploitation of CVE-2019-14287 Sudo Security Bypass Vulnerability. https://github.com/ejlevin99/Sudo-Security-Bypass-VulnerabilityPOC Details
15This is the exploitation of sudo security bypass vulnerabilityhttps://github.com/thinuri99/Sudo-Security-Bypass-Vulnerability-CVE-2019-14287-POC Details
16Nonehttps://github.com/janod313/-CVE-2019-14287-SUDO-bypass-vulnerabilityPOC Details
17Nonehttps://github.com/DewmiApsara/CVE-2019-14287POC Details
18Scripts to verify and execute CVE-2019-14287 as part of Researchhttps://github.com/M108Falcon/Sudo-CVE-2019-14287POC Details
19Nonehttps://github.com/edsonjt81/CVE-2019-14287-POC Details
20CVE-2019-14287https://github.com/DularaAnushka/Linux-Privilege-Escalation-using-Sudo-RightsPOC Details
21Nonehttps://github.com/crypticdante/CVE-2019-14287POC Details
22Nonehttps://github.com/Hasintha-98/Sudo-Vulnerability-Exploit-CVE-2019-14287POC Details
23Nonehttps://github.com/5l1v3r1/cve-2019-14287sudoexpPOC Details
24Nonehttps://github.com/MariliaMeira/CVE-2019-14287POC Details
25Nonehttps://github.com/Ijinleife/CVE-2019-14287POC Details
26Nonehttps://github.com/H3xL00m/CVE-2019-14287POC Details
27Nonehttps://github.com/n3ov4n1sh/CVE-2019-14287POC Details
28Nonehttps://github.com/c0d3cr4f73r/CVE-2019-14287POC Details
29Nonehttps://github.com/Sp3c73rSh4d0w/CVE-2019-14287POC Details
30Nonehttps://github.com/0xwh1pl4sh/CVE-2019-14287POC Details
31Nonehttps://github.com/N3rdyN3xus/CVE-2019-14287POC Details
32Nonehttps://github.com/NyxByt3/CVE-2019-14287POC Details
33Nonehttps://github.com/lemonadern/poc-cve-2019-14287POC Details
34Nonehttps://github.com/h3xcr4ck3r/CVE-2019-14287POC Details
35Nonehttps://github.com/n3rdh4x0r/CVE-2019-14287POC Details
36In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2019/CVE-2019-14287.yamlPOC Details
37Nonehttps://github.com/h3x0v3rl0rd/CVE-2019-14287POC Details
38Documentation for Sudo Security Bypass - CVE 2019-14287https://github.com/sachinthadesilva/Exploit-CVE-2019-14287POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-14287
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-14287

No comments yet


Leave a comment