关联漏洞
描述
CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
介绍
# CVE-2021-3493

Ubuntu OverlayFS Local Privesc
## Description
"Ubuntu specific issue in the overlayfs file system in the Linux kernel where it did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges, due to a patch carried in Ubuntu to allow unprivileged overlayfs mounts." [- Ubuntu Security](https://ubuntu.com/security/CVE-2021-3493)
> Fixed in Linux 5.11
## Affected Versions
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 19.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
> checklist: https://ubuntu.com/security/CVE-2021-3493
## Usage
- ```gcc exploit.c -o exploit```
- ```chmod +x exploit```
- ```./exploit shell|command```
## References
- https://github.com/briskets/CVE-2021-3493
文件快照
[4.0K] /data/pocs/3b66b85c0d1b42240e715f0e0d508a83f87f0cfd
├── [901K] exploit
├── [3.7K] exploit.c
├── [4.0K] images
│ └── [552K] sample.png
└── [ 852] README.md
1 directory, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。