Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-0847
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
初始化不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于新管道缓冲区结构的“flag”变量在 Linux 内核中的 copy_page_to_iter_pipe 和 push_pipe 函数中缺乏正确初始化。非特权本地用户利用该漏洞可以提升权限至root。以下产品和版本受到影响:Linux Kernel 5.8-5.16.11、5.8-5.15.25、5.8-5.10.102。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-kernel Linux Kernel 5.17 rc6 -
II. Public POCs for CVE-2022-0847
#POC DescriptionSource LinkShenlong Link
1This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.https://github.com/Udyz/CVE-2022-0847POC Details
2CVE-2022-0847https://github.com/bbaranoff/CVE-2022-0847POC Details
3Vulnerability in the Linux kernel since 5.8https://github.com/xndpxs/CVE-2022-0847POC Details
4CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”https://github.com/r1is/CVE-2022-0847POC Details
5A root exploit for CVE-2022-0847 (Dirty Pipe)https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-ExploitPOC Details
666666https://github.com/2xYuan/CVE-2022-0847POC Details
7CVE-2022-0847 exploit one linerhttps://github.com/crowsec-edtech/Dirty-PipePOC Details
8Nonehttps://github.com/lucksec/CVE-2022-0847POC Details
9CVE-2022-0487https://github.com/si1ent-le/CVE-2022-0847POC Details
10Nonehttps://github.com/bohr777/cve-2022-0847dirtypipe-exploitPOC Details
11Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.https://github.com/antx-code/CVE-2022-0847POC Details
12An exploit for CVE-2022-0847 dirty-pipe vulnerabilityhttps://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploitPOC Details
13CVE-2022-0847 DirtyPipe Exploit.https://github.com/febinrev/dirtypipez-exploitPOC Details
14CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerabilityhttps://github.com/ahrixia/CVE_2022_0847POC Details
15The Dirty Pipe Vulnerabilityhttps://github.com/knqyf263/CVE-2022-0847POC Details
16Nonehttps://github.com/puckiestyle/CVE-2022-0847POC Details
17Implementation of Max Kellermann's exploit for CVE-2022-0847https://github.com/0xIronGoat/dirty-pipePOC Details
18Nonehttps://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-ExploitPOC Details
19Docker exploithttps://github.com/mrchucu1/CVE-2022-0847-DockerPOC Details
20Bash script to check for CVE-2022-0847 "Dirty Pipe"https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checkerPOC Details
21CVE-2022-0847https://github.com/4luc4rdr5290/CVE-2022-0847POC Details
22A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection.https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploitPOC Details
23Nonehttps://github.com/Greetdawn/CVE-2022-0847-DirtyPipePOC Details
24CVE-2022-0847https://github.com/Al1ex/CVE-2022-0847POC Details
25Nonehttps://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-ExploitPOC Details
26Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)https://github.com/nanaao/Dirtypipe-exploitPOC Details
27Nonehttps://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploitPOC Details
28Nonehttps://github.com/pentestblogin/pentestblog-CVE-2022-0847POC Details
29Dirty Pipe POChttps://github.com/gyaansastra/CVE-2022-0847POC Details
30Container Excape PoC for CVE-2022-0847 "DirtyPipe"https://github.com/DataDog/dirtypipe-container-breakout-pocPOC Details
31A root exploit for CVE-2022-0847 (Dirty Pipe)https://github.com/babyshen/CVE-2022-0847POC Details
32Nonehttps://github.com/edsonjt81/CVE-2022-0847-LinuxPOC Details
33CVE-2022-0847 POC and Docker and Analysis write uphttps://github.com/chenaotian/CVE-2022-0847POC Details
34CVE-2022-0847-DirtyPipe-Exploithttps://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-ExploitPOC Details
35Nonehttps://github.com/al4xs/CVE-2022-0847-Dirty-PipePOC Details
36Nonehttps://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-POC Details
37A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shellhttps://github.com/crusoe112/DirtyPipePythonPOC Details
38CVE-2022-0847 Python exploit to get root or write a no write permission, immutable or read-only mounted file.https://github.com/nanaao/dirtyPipe-automaticRootPOC Details
39my personal exploit of CVE-2022-0847(dirty pipe)https://github.com/arttnba3/CVE-2022-0847POC Details
40A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
41CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. /etc/passwd, /etc/shadow.https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847POC Details
42Dirty Pipe (CVE-2022-0847) zafiyeti kontrolü https://github.com/realbatuhan/dirtypipetesterPOC Details
43dirtypipehttps://github.com/CYB3RK1D/CVE-2022-0847-POCPOC Details
44CVE-2022-0847 POChttps://github.com/breachnix/dirty-pipe-pocPOC Details
45Implementation of CVE-2022-0847 as a shellcodehttps://github.com/Shotokhan/cve_2022_0847_shellcodePOC Details
46Nonehttps://github.com/githublihaha/DirtyPIPE-CVE-2022-0847POC Details
47Python script to check if your kernel is vulnerable to Dirty pipe CVE-2022-0847https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checkerPOC Details
48PoC Container Breakout for DirtyPipe Vulnerability CVE-2022-0847 https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-BreakoutPOC Details
49Hacked up Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn a root shell. (and attempts to restore the damaged binary as well)https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipePOC Details
50pwncat module that automatically exploits CVE-2022-0847 (dirtypipe)https://github.com/DanaEpp/pwncat_dirtypipePOC Details
51Dirty Pipe - CVE-2022-0847https://github.com/tmoneypenny/CVE-2022-0847POC Details
52Exploit for Dirty-Pipe (CVE-2022-0847) https://github.com/scopion/dirty-pipePOC Details
53Presentation slides and supplementary materialhttps://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847POC Details
54DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.https://github.com/drapl0n/dirtypipePOC Details
55Linux “Dirty Pipe” vulnerability gives unprivileged users root accesshttps://github.com/0xr1l3s/CVE-2022-0847POC Details
56Dirty Pipe Vulnerability Detection Script - RHSB-2022-002 Dirty Pipe - kernel arbitrary file manipulation - (CVE-2022-0847) https://github.com/mhanief/dirtypipePOC Details
57Nonehttps://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEscPOC Details
58Scripted Linux Privilege Escalation for the CVE-2022-0847 "Dirty Pipe" vulnerabilityhttps://github.com/rexpository/linux-privilege-escalationPOC Details
59Files required to demonstrate CVE-2022-0847 vulnerability in Linux Kernel v5.8https://github.com/isaiahsimeone/COMP3320-VAPTPOC Details
60This repository is developed to analysis and understand DirtyPipe exploit CVE-2022-0847https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847POC Details
61A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11https://github.com/ih3na/debian11-dirty_pipe-patcherPOC Details
62CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸https://github.com/greenhandatsjtu/CVE-2022-0847-Container-EscapePOC Details
63A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.https://github.com/flux10n/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
64An eBPF detection program for CVE-2022-0847https://github.com/airbus-cert/dirtypipe-ebpf_detectionPOC Details
65exp of CVE-2022-0847https://github.com/edr1412/Dirty-PipePOC Details
66COMPILEDhttps://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
67Modified dirtypipe script into auto root without have to search a file manually to hijack suid binary.https://github.com/EagleTube/CVE-2022-0847POC Details
68CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸https://github.com/yoeelingBin/CVE-2022-0847-Container-EscapePOC Details
69Nonehttps://github.com/cont3mpt/CVE-2022-0847POC Details
70Proof-of-concept exploit for the Dirty Pipe vulnerability (CVE-2022-0847)https://github.com/notl0cal/dpipePOC Details
71CVE-2022-0847(Dirty Pipe) vulnerability exploits.https://github.com/Gustavo-Nogueira/Dirty-Pipe-ExploitsPOC Details
72Compled version of CVE-2022-0847 aka Dirty Pipe. Just one shot to root them all :Dhttps://github.com/b4dboy17/Dirty-Pipe-OneshotPOC Details
73Nonehttps://github.com/edsonjt81/CVE-2022-0847-DirtyPipe-POC Details
74Resources required for building Pluralsight CVE-2022-0847 labhttps://github.com/Turzum/ps-lab-cve-2022-0847POC Details
75修改版CVE-2022-0847https://github.com/qwert419/linux-POC Details
76CVE-2022-0847https://github.com/DataFox/CVE-2022-0847POC Details
77Dirty Pipe Kernel Vulnerability Exploithttps://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847POC Details
78Nonehttps://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCsPOC Details
79This is a repo to showcase the dirty pipe Linux Kernel Vulnerability.https://github.com/mutur4/CVE-2022-0847POC Details
80Nonehttps://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
81Nonehttps://github.com/4bhishek0/CVE-2022-0847-PocPOC Details
82A simple exploit that uses dirtypipe to inject shellcode into runC entrypoint to implement container escapes.https://github.com/JlSakuya/CVE-2022-0847-container-escapePOC Details
83check cve-2022-0847https://github.com/jonathanbest7/cve-2022-0847POC Details
84POC Exploit to add user to Sudo for CVE-2022-0847 Dirty Pipe Vulnerabilityhttps://github.com/0xeremus/dirty-pipe-pocPOC Details
85An eBPF program to detect attacks on CVE-2022-0847https://github.com/h4ckm310n/CVE-2022-0847-eBPFPOC Details
86Using CVE-2022-0847, "Dirty Pipe Exploit", to pop a reverse bash shell for arbitrary code execution on a foreign machine.https://github.com/joeymeech/CVE-2022-0847-Exploit-ImplementationPOC Details
87CVE: CVE-2022-0847https://github.com/pashayogi/DirtyPipePOC Details
88Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.https://github.com/n3rada/DirtyPipePOC Details
89Bash script to check if kernel is vulnerable https://github.com/ayushx007/CVE-2022-0847-dirty-pipe-checkerPOC Details
90Nonehttps://github.com/ayushx007/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
91Nonehttps://github.com/solomon12354/CVE-2022-0847-Dirty_Pipe_virusPOC Details
92Nonehttps://github.com/nu1l-ptr/CVE-2022-0847-PocPOC Details
93Nonehttps://github.com/letsr00t/CVE-2022-0847POC Details
94Nonehttps://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virusPOC Details
95Nonehttps://github.com/xsxtw/CVE-2022-0847POC Details
96A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.https://github.com/jxpsx/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
97Nonehttps://github.com/Asbatel/CBDS_CVE-2022-0847_POCPOC Details
98Nonehttps://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checkerPOC Details
99Nonehttps://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-ExploitsPOC Details
100This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.https://github.com/CPT-Jack-A-Castle/CVE-2022-0847POC Details
101Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.https://github.com/ZZ-SOCMAP/CVE-2022-0847POC Details
102Nonehttps://github.com/JustinYe377/CTF-CVE-2022-0847POC Details
103The **Dirty Pipe exploit (CVE-2022-0847)** is a Linux kernel vulnerability (v5.8+) allowing unprivileged attackers to overwrite arbitrary files via a flaw in the pipe mechanism. This leads to privilege escalation, granting root access. Similar to Dirty Cow but easier to exploit. Fix: Update to a patched kernel version.https://github.com/mithunmadhukuttan/Dirty-Pipe-ExploitPOC Details
104CVE-2022-0847https://github.com/Mephierr/DirtyPipe_exploitPOC Details
105Nonehttps://github.com/RogelioPumajulca/CVE-2022-0847POC Details
106Nonehttps://github.com/osungjinwoo/CVE-2022-0847-Dirty-PipePOC Details
107Proof of concept for CVE-2022-0847https://github.com/karanlvm/DirtyPipe-ExploitPOC Details
108A root exploit for CVE-2022-0847 (Dirty Pipe)https://github.com/cypherlobo/DirtyPipe-BSIPOC Details
109Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20DirtyPipe%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2022-0847.mdPOC Details
110exp of CVE-2022-0847https://github.com/zzzchuu/Dirty-PipePOC Details
111A Simple bash script that patches the CVE-2022-0847 (dirty pipe) kernel vulnerability on Debian 11https://github.com/ihenakaarachchi/debian11-dirty_pipe-patcherPOC Details
112Simple Exploit for Dirty Pipe Vulnerability (CVE-2022-0847) This repository contains a simple proof of concept (PoC) for the Dirty Pipe vulnerability (CVE-2022-0847), which affects Linux kernel versions 5.8 to 5.16. This exploit demonstrates local privilege escalation by leveraging improper handling of pipe buffers in the kernel.https://github.com/byteReaper77/Dirty-PipePOC Details
113Nonehttps://github.com/DelphineTan/Murdoch-CVE-2022-0847POC Details
114DirtyPipe (CVE-2022-0847) exploit written in Rusthttps://github.com/morgenm/dirtypipePOC Details
115Nonehttps://github.com/Scouserr/cve-2022-0847-poc-dockerimagePOC Details
116exploit of CVE-2022-0847 which directly remove password of the root accounthttps://github.com/Shadow-Spinner/CVE-2022-0847POC Details
117Nonehttps://github.com/honeyvig/CVE-2022-0847-DirtyPipe-ExploitPOC Details
118Nonehttps://github.com/gladiator-07/CVE-2022-0847POC Details
119CVE-2022-0847(Linux 内核本地提权漏洞)https://github.com/xiaoLvChen/CVE-2022-0847POC Details
120Very rough PoC for detecting/reproducing CVE-2022-0847 (dirty pipe) through random generation of syscalls and differential fuzzing against a model.https://github.com/stfnw/reproducer-poc-CVE-2022-0847POC Details
121Exploiting CVE-2022-0847 - written by : Antonius (w1sdom)https://github.com/bluedragonsecurity/Linux-Kernel-Dirty-Pipe-Exploitation-Logic-Bug-POC Details
122This tool demonstrates the application of fundamental physics discoveries to cybersecurity.https://github.com/SimoesCTT/Chrono-Drip-Temporal-Viscosity-Exploitation-Framework-CVE-2022-0847POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-0847
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-0847

No comments yet


Leave a comment