Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-3156
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sudo 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.5p2 之前版本存在缓冲区错误漏洞,攻击者可使用sudoedit -s和一个以单个反斜杠字符结束的命令行参数升级到root。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2021-3156
#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/mr-r3b00t/CVE-2021-3156POC Details
2Nonehttps://github.com/nexcess/sudo_cve-2021-3156POC Details
3CVE-2021-3156https://github.com/reverse-ex/CVE-2021-3156POC Details
4Nonehttps://github.com/unauth401/CVE-2021-3156POC Details
5CVE-2021-3156https://github.com/ymrsmns/CVE-2021-3156POC Details
6This simple bash script will patch the recently discovered sudo heap overflow vulnerability.https://github.com/elbee-cyber/CVE-2021-3156-PATCHERPOC Details
71day research efforthttps://github.com/kernelzeroday/CVE-2021-3156-Baron-SameditPOC Details
8cve-2021-3156;sudo堆溢出漏洞;漏洞检测https://github.com/yaunsky/cve-2021-3156POC Details
9Nonehttps://github.com/baka9moe/CVE-2021-3156-ExpPOC Details
10CVE-2021-3156https://github.com/ph4ntonn/CVE-2021-3156POC Details
11Nonehttps://github.com/binw2018/CVE-2021-3156-SCRIPTPOC Details
12Nonehttps://github.com/freeFV/CVE-2021-3156POC Details
13Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudohttps://github.com/mbcrump/CVE-2021-3156POC Details
14PoC for CVE-2021-3156 (sudo heap overflow)https://github.com/stong/CVE-2021-3156POC Details
15checking CVE-2021-3156 vulnerability & patch scripthttps://github.com/nobodyatall648/CVE-2021-3156POC Details
16Nonehttps://github.com/blasty/CVE-2021-3156POC Details
17Nonehttps://github.com/teamtopkarl/CVE-2021-3156POC Details
18复现别人家的CVEs系列https://github.com/Q4n/CVE-2021-3156POC Details
19Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. https://github.com/kal1gh0st/CVE-2021-3156POC Details
20A docker environment to research CVE-2021-3156https://github.com/apogiatzis/docker-CVE-2021-3156POC Details
21a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo).https://github.com/voidlsd/CVE-2021-3156POC Details
22Patch Script for CVE-2021-3156 Heap Overflowhttps://github.com/Ashish-dawani/CVE-2021-3156-PatchPOC Details
23Nonehttps://github.com/SantiagoSerrao/ScannerCVE-2021-3156POC Details
24CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).https://github.com/DanielAzulayy/CTF-2021POC Details
25Nonehttps://github.com/cdeletre/Serpentiel-CVE-2021-3156POC Details
26CVE-2021-3156 Vagrant Labhttps://github.com/dinhbaouit/CVE-2021-3156POC Details
27Root shell PoC for CVE-2021-3156https://github.com/CptGibbon/CVE-2021-3156POC Details
28Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches appliedhttps://github.com/perlun/sudo-1.8.3p1-patchedPOC Details
29Nonehttps://github.com/1N53C/CVE-2021-3156-PoCPOC Details
30CVE-2021-3156: Sudo heap overflow exploit for Debian 10https://github.com/0xdevil/CVE-2021-3156POC Details
31보안취약점 확인https://github.com/gmldbd94/cve-2021-3156POC Details
32sudo heap overflow to LPE, in Gohttps://github.com/jm33-m0/CVE-2021-3156POC Details
33CVE-2021-3156非交互式执行命令https://github.com/Rvn0xsy/CVE-2021-3156-plusPOC Details
34How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156?https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerabilityPOC Details
35Nonehttps://github.com/oneoy/CVE-2021-3156POC Details
36Sudo Baron Samedit Exploithttps://github.com/worawit/CVE-2021-3156POC Details
37Exploit generator for sudo CVE-2021-3156https://github.com/lmol/CVE-2021-3156POC Details
38CVE-2021-3156漏洞修复Shellhttps://github.com/BearCat4/CVE-2021-3156POC Details
39Nonehttps://github.com/password520/CVE-2021-3156POC Details
40Nonehttps://github.com/capturingcats/CVE-2021-3156POC Details
41CVE-2021-3156 - Sudo Baron Samedithttps://github.com/LiveOverflow/pwneditPOC Details
42Nonehttps://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-BuildPOC Details
43Nonehttps://github.com/donghyunlee00/CVE-2021-3156POC Details
44Nonehttps://github.com/TheFlash2k/CVE-2021-3156POC Details
45Nonehttps://github.com/Exodusro/CVE-2021-3156POC Details
46Nonehttps://github.com/CyberCommands/CVE-2021-3156POC Details
47Sudo Heap Overflow Baron Samedithttps://github.com/0x7183/CVE-2021-3156POC Details
48Nonehttps://github.com/Y3A/CVE-2021-3156POC Details
49CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04https://github.com/redhawkeye/sudo-exploitPOC Details
50Sudo heap-based buffer overflow privilege escalation commands and mitigations.https://github.com/d3c3ptic0n/CVE-2021-3156POC Details
51Nonehttps://github.com/musergi/CVE-2021-3156POC Details
52CVE-2021-3156 exploithttps://github.com/halissha/CVE-2021-3156POC Details
53Exploit and Demo system for CVE-2021-3156https://github.com/sharkmoos/Baron-SameditPOC Details
54CVE-2021-3156 POC and Docker and Analysis write uphttps://github.com/chenaotian/CVE-2021-3156POC Details
55CVE-2021-3156 deep dive.https://github.com/ret2basic/SudoSciencePOC Details
56Nonehttps://github.com/puckiestyle/CVE-2021-3156POC Details
57Exploit for CVE-2021-3156https://github.com/barebackbandit/CVE-2021-3156POC Details
58CVE-2021-3156https://github.com/RodricBr/CVE-2021-3156POC Details
59CMPT733 Cybersecurity Lab II Project: GDB plugin for heap exploits inspired by CVE-2021-3156https://github.com/ypl6/heaplensPOC Details
60sudo提权漏洞CVE-2021-3156复现代码https://github.com/q77190858/CVE-2021-3156POC Details
61CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)https://github.com/arvindshima/CVE-2021-3156POC Details
62Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerabilityhttps://github.com/Mhackiori/CVE-2021-3156POC Details
63The test report of this exploit.https://github.com/baka9moe/CVE-2021-3156-TestReportPOC Details
64利用sudo提权,只针对cnetos7https://github.com/PhuketIsland/CVE-2021-3156-centos7POC Details
65clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.https://github.com/0x4ndy/clifPOC Details
66Nonehttps://github.com/meowhua15/CVE-2021-3156POC Details
67Nonehttps://github.com/mutur4/CVE-2021-3156POC Details
68Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scriptshttps://github.com/PurpleOzone/PE_CVE-CVE-2021-3156POC Details
69Nonehttps://github.com/asepsaepdin/CVE-2021-3156POC Details
70Nonehttps://github.com/DDayLuong/CVE-2021-3156POC Details
71Forked from @worawit, shorter&optimized. Only works for sudo=1.8.23 on Centos7https://github.com/wurwur/CVE-2021-3156POC Details
72Nonehttps://github.com/SamTruss/LMU-CVE-2021-3156POC Details
73kernal exploit 3156https://github.com/34rthq04k3/CVE-2021-3156POC Details
74kernal exploit 3156https://github.com/ragingkarson/CVE-2021-3156POC Details
75Checker for CVE-2021-3156 with static version checkhttps://github.com/lypd0/CVE-2021-3156-checkerPOC Details
76Nonehttps://github.com/ZTK-009/CVE-2021-3156POC Details
77Y3A / CVE-2021-3156https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156POC Details
78Nonehttps://github.com/DASICS-ICT/DASICS-CVE-2021-3156POC Details
79Nonehttps://github.com/Typical0day/CVE-2021-3156POC Details
80Nonehttps://github.com/hycheng15/CVE-2021-3156POC Details
81Nonehttps://github.com/acidburn2049/CVE-2021-3156POC Details
82fork of worawit/CVE-2021-3156 exploit_nss.py modified to work with ifconfig instead of the ip commandhttps://github.com/Bad3r/CVE-2021-3156-without-ip-commandPOC Details
83Nonehttps://github.com/Sebastianbedoya25/CVE-2021-3156POC Details
84This repository contains a Proof-of-Concept (PoC) exploit for the Baron Samedit vulnerability (CVE-2021-3156). The exploit demonstrates privilege escalation on Ubuntu 20.04 with sudo version 1.8.31 and glibc version 2.31. It includes an assembly-based exploit, a shared object payload, and a Makefile for automated compilation.https://github.com/ten-ops/baron-sameditPOC Details
85Nonehttps://github.com/Sornphut/CVE-2021-3156-Heap-Based-Buffer-Overflow-in-Sudo-Baron-Samedit-POC Details
86Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2021/CVE-2021-3156.yamlPOC Details
87Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2021-3156.mdPOC Details
88Nonehttps://github.com/shishirpandey18/CVE-2021-3156POC Details
89Nonehttps://github.com/duongdz96/CVE-2021-3156-mainPOC Details
90Nonehttps://github.com/Shuhaib88/Baron-Samedit-Heap-Buffer-Overflow-CVE-2021-3156POC Details
91Nonehttps://github.com/Superliverbun/cve-2021-3156-POC Details
92CVE-2021-3156-Exploit-Demohttps://github.com/TopskiyPavelQwertyGang/Review.CVE-2021-3156POC Details
93Exploit para explotar la vulnerabilidad CVE-2021-3156.https://github.com/Maalfer/Sudo-CVE-2021-3156POC Details
94A research regarding the exisiting CVE exploit : CVE-2021-3156(Sudo BufferOverflow)https://github.com/HuzaifaTariqAfzalKhan/CVE-Exploit-Research-Development-ITSOLERAPOC Details
95Projeto educacional desenvolvido em Python com foco na análise da vulnerabilidade CVE-2021-3156 (Baron Samedit), uma falha crítica no sudo que permitia elevação de privilégio local em sistemas Linux.https://github.com/VilmarTuminskii/cve-2021-3156-sudo-labPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-3156
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-3156

No comments yet


Leave a comment