# N/A
## 漏洞概述
Polkit存在一个漏洞,可能导致绕过D-Bus请求的凭据检查,提升请求者的权限到root用户。这可能使未授权的本地攻击者创建新的本地管理员账户。
## 影响版本
无具体版本信息
## 漏洞细节
攻击者可以通过绕过polkit的凭据检查机制,提升其权限至root级别。这种提升权限的能力可以允许攻击者执行如创建新的本地管理员账户等高危操作。
## 漏洞影响
此漏洞的最大威胁在于数据的保密性和完整性以及系统的可用性。攻击者能够利用此漏洞进行未经授权的特权操作,并可能对系统造成严重破坏。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Automatic Explotation PoC for Polkit CVE-2021-3560 | https://github.com/aancw/polkit-auto-exploit | POC详情 |
2 | CVE-2021-3560 Local PrivEsc Exploit | https://github.com/swapravo/polkadots | POC详情 |
3 | a reliable C based exploit and writeup for CVE-2021-3560. | https://github.com/hakivvi/CVE-2021-3560 | POC详情 |
4 | polkit exploit script v1.0 | https://github.com/iSTAR-Lab/CVE-2021-3560_PoC | POC详情 |
5 | None | https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation | POC详情 |
6 | Polkit - Local Privilege Escalation (CVE-2021-3560) | https://github.com/curtishoughton/CVE-2021-3560 | POC详情 |
7 | Privilege escalation with polkit - CVE-2021-3560 | https://github.com/Almorabea/Polkit-exploit | POC详情 |
8 | None | https://github.com/AssassinUKG/Polkit-CVE-2021-3560 | POC详情 |
9 | ubuntu new PrivEsc race condition vulnerability | https://github.com/cpu0x00/CVE-2021-3560 | POC详情 |
10 | NYCY_homework_&_meeting | https://github.com/BizarreLove/CVE-2021-3560 | POC详情 |
11 | Polkit D-Bus Authentication Bypass Exploit | https://github.com/0dayNinja/CVE-2021-3560 | POC详情 |
12 | CVE-2021-3560 (Polkit - Local Privilege Escalation) | https://github.com/TomMalvoRiddle/CVE-2021-3560 | POC详情 |
13 | CVE-2021-3560 analysis | https://github.com/chenaotian/CVE-2021-3560 | POC详情 |
14 | Polkit Exploit (CVE-2021-3560), no download capabilty? Copy and paste it! | https://github.com/n3onhacks/CVE-2021-3560 | POC详情 |
15 | f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation | https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus | POC详情 |
16 | None | https://github.com/innxrmxst/CVE-2021-3560 | POC详情 |
17 | PolicyKit CVE-2021-3560 Exploit (Authentication Agent) | https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent | POC详情 |
18 | PolicyKit CVE-2021-3560 Exploitation (Authentication Agent) | https://github.com/WinMin/CVE-2021-3560 | POC详情 |
19 | Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation | https://github.com/UNICORDev/exploit-CVE-2021-3560 | POC详情 |
20 | None | https://github.com/asepsaepdin/CVE-2021-3560 | POC详情 |
21 | Polkit 0.105-26 0.117-2 - Local Privilege Escalation | https://github.com/pashayogi/ROOT-CVE-2021-3560 | POC详情 |
22 | CVE-2021-3560 Bypass su - root | https://github.com/TieuLong21Prosper/CVE-2021-3560 | POC详情 |
23 | Exploitation of the CVE-2021-3560 polkit vulnerability | https://github.com/LucasPDiniz/CVE-2021-3560 | POC详情 |
24 | None | https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation | POC详情 |
25 | Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability. | https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT | POC详情 |
26 | Polkit Exploit (CVE-2021-3560), no download capabilty? Copy and paste it! | https://github.com/NeonWhiteRabbit/CVE-2021-3560 | POC详情 |
27 | CVE-2021-3560 (Polkit - Local Privilege Escalation) | https://github.com/admin-079/CVE-2021-3560 | POC详情 |
28 | Exploitation Script for CVE-2021-3560 | https://github.com/arcslash/exploit_CVE-2021-3560 | POC详情 |
29 | This is an exercise built around CVE-2021-3560 | https://github.com/titusG85/SideWinder-Exploit | POC详情 |
30 | None | https://github.com/MandipJoshi/CVE-2021-3560 | POC详情 |
31 | Script Bash -- CVE-2021-3560 | https://github.com/Antoine-MANTIS/POC-Bash-CVE-2021-3560 | POC详情 |
暂无评论