目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2021-3156 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Sudo 缓冲区错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.5p2 之前版本存在缓冲区错误漏洞,攻击者可使用sudoedit -s和一个以单个反斜杠字符结束的命令行参数升级到root。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2021-3156 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/mr-r3b00t/CVE-2021-3156POC详情
2Nonehttps://github.com/nexcess/sudo_cve-2021-3156POC详情
3CVE-2021-3156https://github.com/reverse-ex/CVE-2021-3156POC详情
4Nonehttps://github.com/unauth401/CVE-2021-3156POC详情
5CVE-2021-3156https://github.com/ymrsmns/CVE-2021-3156POC详情
6This simple bash script will patch the recently discovered sudo heap overflow vulnerability.https://github.com/elbee-cyber/CVE-2021-3156-PATCHERPOC详情
71day research efforthttps://github.com/kernelzeroday/CVE-2021-3156-Baron-SameditPOC详情
8cve-2021-3156;sudo堆溢出漏洞;漏洞检测https://github.com/yaunsky/cve-2021-3156POC详情
9Nonehttps://github.com/baka9moe/CVE-2021-3156-ExpPOC详情
10CVE-2021-3156https://github.com/ph4ntonn/CVE-2021-3156POC详情
11Nonehttps://github.com/binw2018/CVE-2021-3156-SCRIPTPOC详情
12Nonehttps://github.com/freeFV/CVE-2021-3156POC详情
13Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudohttps://github.com/mbcrump/CVE-2021-3156POC详情
14PoC for CVE-2021-3156 (sudo heap overflow)https://github.com/stong/CVE-2021-3156POC详情
15checking CVE-2021-3156 vulnerability & patch scripthttps://github.com/nobodyatall648/CVE-2021-3156POC详情
16Nonehttps://github.com/blasty/CVE-2021-3156POC详情
17Nonehttps://github.com/teamtopkarl/CVE-2021-3156POC详情
18复现别人家的CVEs系列https://github.com/Q4n/CVE-2021-3156POC详情
19Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. https://github.com/kal1gh0st/CVE-2021-3156POC详情
20A docker environment to research CVE-2021-3156https://github.com/apogiatzis/docker-CVE-2021-3156POC详情
21a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo).https://github.com/voidlsd/CVE-2021-3156POC详情
22Patch Script for CVE-2021-3156 Heap Overflowhttps://github.com/Ashish-dawani/CVE-2021-3156-PatchPOC详情
23Nonehttps://github.com/SantiagoSerrao/ScannerCVE-2021-3156POC详情
24CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).https://github.com/DanielAzulayy/CTF-2021POC详情
25Nonehttps://github.com/cdeletre/Serpentiel-CVE-2021-3156POC详情
26CVE-2021-3156 Vagrant Labhttps://github.com/dinhbaouit/CVE-2021-3156POC详情
27Root shell PoC for CVE-2021-3156https://github.com/CptGibbon/CVE-2021-3156POC详情
28Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches appliedhttps://github.com/perlun/sudo-1.8.3p1-patchedPOC详情
29Nonehttps://github.com/1N53C/CVE-2021-3156-PoCPOC详情
30CVE-2021-3156: Sudo heap overflow exploit for Debian 10https://github.com/0xdevil/CVE-2021-3156POC详情
31보안취약점 확인https://github.com/gmldbd94/cve-2021-3156POC详情
32sudo heap overflow to LPE, in Gohttps://github.com/jm33-m0/CVE-2021-3156POC详情
33CVE-2021-3156非交互式执行命令https://github.com/Rvn0xsy/CVE-2021-3156-plusPOC详情
34How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156?https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerabilityPOC详情
35Nonehttps://github.com/oneoy/CVE-2021-3156POC详情
36Sudo Baron Samedit Exploithttps://github.com/worawit/CVE-2021-3156POC详情
37Exploit generator for sudo CVE-2021-3156https://github.com/lmol/CVE-2021-3156POC详情
38CVE-2021-3156漏洞修复Shellhttps://github.com/BearCat4/CVE-2021-3156POC详情
39Nonehttps://github.com/password520/CVE-2021-3156POC详情
40Nonehttps://github.com/capturingcats/CVE-2021-3156POC详情
41CVE-2021-3156 - Sudo Baron Samedithttps://github.com/LiveOverflow/pwneditPOC详情
42Nonehttps://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-BuildPOC详情
43Nonehttps://github.com/donghyunlee00/CVE-2021-3156POC详情
44Nonehttps://github.com/TheFlash2k/CVE-2021-3156POC详情
45Nonehttps://github.com/Exodusro/CVE-2021-3156POC详情
46Nonehttps://github.com/CyberCommands/CVE-2021-3156POC详情
47Sudo Heap Overflow Baron Samedithttps://github.com/0x7183/CVE-2021-3156POC详情
48Nonehttps://github.com/Y3A/CVE-2021-3156POC详情
49CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04https://github.com/redhawkeye/sudo-exploitPOC详情
50Sudo heap-based buffer overflow privilege escalation commands and mitigations.https://github.com/d3c3ptic0n/CVE-2021-3156POC详情
51Nonehttps://github.com/musergi/CVE-2021-3156POC详情
52CVE-2021-3156 exploithttps://github.com/halissha/CVE-2021-3156POC详情
53Exploit and Demo system for CVE-2021-3156https://github.com/sharkmoos/Baron-SameditPOC详情
54CVE-2021-3156 POC and Docker and Analysis write uphttps://github.com/chenaotian/CVE-2021-3156POC详情
55CVE-2021-3156 deep dive.https://github.com/ret2basic/SudoSciencePOC详情
56Nonehttps://github.com/puckiestyle/CVE-2021-3156POC详情
57Exploit for CVE-2021-3156https://github.com/barebackbandit/CVE-2021-3156POC详情
58CVE-2021-3156https://github.com/RodricBr/CVE-2021-3156POC详情
59CMPT733 Cybersecurity Lab II Project: GDB plugin for heap exploits inspired by CVE-2021-3156https://github.com/ypl6/heaplensPOC详情
60sudo提权漏洞CVE-2021-3156复现代码https://github.com/q77190858/CVE-2021-3156POC详情
61CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)https://github.com/arvindshima/CVE-2021-3156POC详情
62Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerabilityhttps://github.com/Mhackiori/CVE-2021-3156POC详情
63The test report of this exploit.https://github.com/baka9moe/CVE-2021-3156-TestReportPOC详情
64利用sudo提权,只针对cnetos7https://github.com/PhuketIsland/CVE-2021-3156-centos7POC详情
65clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.https://github.com/0x4ndy/clifPOC详情
66Nonehttps://github.com/meowhua15/CVE-2021-3156POC详情
67Nonehttps://github.com/mutur4/CVE-2021-3156POC详情
68Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scriptshttps://github.com/PurpleOzone/PE_CVE-CVE-2021-3156POC详情
69Nonehttps://github.com/asepsaepdin/CVE-2021-3156POC详情
70Nonehttps://github.com/DDayLuong/CVE-2021-3156POC详情
71Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7https://github.com/wurwur/CVE-2021-3156POC详情
72Nonehttps://github.com/SamTruss/LMU-CVE-2021-3156POC详情
73kernal exploit 3156https://github.com/34rthq04k3/CVE-2021-3156POC详情
74kernal exploit 3156https://github.com/ragingkarson/CVE-2021-3156POC详情
75Checker for CVE-2021-3156 with static version checkhttps://github.com/lypd0/CVE-2021-3156-checkerPOC详情
76Nonehttps://github.com/ZTK-009/CVE-2021-3156POC详情
77Y3A / CVE-2021-3156https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156POC详情
78Nonehttps://github.com/DASICS-ICT/DASICS-CVE-2021-3156POC详情
79Nonehttps://github.com/Typical0day/CVE-2021-3156POC详情
80Nonehttps://github.com/hycheng15/CVE-2021-3156POC详情
81Nonehttps://github.com/acidburn2049/CVE-2021-3156POC详情
82fork of worawit/CVE-2021-3156 exploit_nss.py modified to work with ifconfig instead of the ip commandhttps://github.com/Bad3r/CVE-2021-3156-without-ip-commandPOC详情
83Nonehttps://github.com/Sebastianbedoya25/CVE-2021-3156POC详情
84This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation.https://github.com/ten-ops/baron-sameditPOC详情
85Nonehttps://github.com/Sornphut/CVE-2021-3156-Heap-Based-Buffer-Overflow-in-Sudo-Baron-Samedit-POC详情
86Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2021/CVE-2021-3156.yamlPOC详情
87Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3156.mdPOC详情
88Nonehttps://github.com/shishirpandey18/CVE-2021-3156POC详情
89Nonehttps://github.com/duongdz96/CVE-2021-3156-mainPOC详情
90Nonehttps://github.com/Shuhaib88/Baron-Samedit-Heap-Buffer-Overflow-CVE-2021-3156POC详情
91Nonehttps://github.com/Superliverbun/cve-2021-3156-POC详情
92CVE-2021-3156-Exploit-Demohttps://github.com/TopskiyPavelQwertyGang/Review.CVE-2021-3156POC详情
93Exploit para explotar la vulnerabilidad CVE-2021-3156.https://github.com/Maalfer/Sudo-CVE-2021-3156POC详情
94A research regarding the exisiting CVE exploit : CVE-2021-3156(Sudo BufferOverflow)https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERAPOC详情
95Projeto educacional desenvolvido em Python com foco na análise da vulnerabilidade CVE-2021-3156 (Baron Samedit), uma falha crítica no sudo que permitia elevação de privilégio local em sistemas Linux.https://github.com/VilmarTuminskii/cve-2021-3156-sudo-labPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2021-3156 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-3156

暂无评论


发表评论