Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37706 PoC — Enlightenment 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Enlightenment 权限许可和访问控制问题漏洞 (CVE-2022-37706)
Description:Enlightenment是美国Debian社区的一种 X11 的高级窗口管理器。 Enlightenment 存在权限许可和访问控制问题漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Readme
# CVE-2022-37706

The **CVE-2022-37706** vulnerability is related to the **Enlightenment** window manager, specifically the `enlightenment_sys` binary. This binary has the **SUID** (Set User ID) bit enabled, meaning it can be executed with elevated privileges (usually as the root user).

### Summary:
- **Vulnerability**: CVE-2022-37706 is a local privilege escalation vulnerability.
- **Component**: The `enlightenment_sys` binary in the Enlightenment window manager.
- **Issue**: An attacker can exploit improper input handling or insecure file path manipulations in this SUID binary. By crafting a malicious command or manipulating file paths, the attacker can execute arbitrary code as the root user.
- **Impact**: Successful exploitation grants the attacker a root shell, enabling full control over the system.
- **Risk**: This vulnerability is particularly dangerous on systems where the Enlightenment window manager is installed, as it allows local users to gain root access.

### Mitigation:
To protect against this vulnerability, users should update to a patched version of Enlightenment where the SUID permissions are properly managed, or remove the SUID bit from the vulnerable binary (`chmod u-s enlightenment_sys`).

This vulnerability highlights the risks of improper privilege management in setuid binaries.

File Snapshot

[4.0K] /data/pocs/45d18d67802a8af4555da959fb919a1237383866 ├── [1.3K] exploit.sh └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.