Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3493 PoC — Linux kernel 安全漏洞

Source
Associated Vulnerability
Title:Linux kernel 安全漏洞 (CVE-2021-3493)
Description:Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 linux kernel 存在安全漏洞,该漏洞源于非特权用户名称空间和Ubuntu内核中允许非特权覆盖的补丁的组合,攻击者可利用该漏洞可以使用它来获得更高的特权。
Description
CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
Readme
# CVE-2021-3493

![sample](images/sample.png)

Ubuntu OverlayFS Local Privesc

## Description

"Ubuntu specific issue in the overlayfs file system in the Linux kernel where it did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges, due to a patch carried in Ubuntu to allow unprivileged overlayfs mounts." [- Ubuntu Security](https://ubuntu.com/security/CVE-2021-3493)

> Fixed in Linux 5.11

## Affected Versions

- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 19.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM

> checklist: https://ubuntu.com/security/CVE-2021-3493

## Usage

- ```gcc exploit.c -o exploit```
- ```chmod +x exploit```
- ```./exploit shell|command```


## References

- https://github.com/briskets/CVE-2021-3493

File Snapshot

[4.0K] /data/pocs/3b66b85c0d1b42240e715f0e0d508a83f87f0cfd ├── [901K] exploit ├── [3.7K] exploit.c ├── [4.0K] images │   └── [552K] sample.png └── [ 852] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.