关联漏洞
Description
Environment for DynoRoot (CVE-2018-1111)
介绍
# CVE-2018-1111
Environment for CVE-2018-1111
## Movie

## Command
### docker-compose
```
$ docker-compose up -d
```
### Attacker
```
$ docker-compose exec attacker bash
[root@attacker /]# /scripts/attack.sh
Ncat: Version 7.50 ( https://nmap.org/ncat )
Ncat: Listening on :::1337
Ncat: Listening on 0.0.0.0:1337
```
### Victim
```
$ docker-compose exec victim bash
[root@victim /]# /scripts/victim.sh
Connection 'eth0' (90e3f2ae-e210-446d-8dfb-3f87510ab736) successfully added.
Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/1)
```
文件快照
[4.0K] /data/pocs/7b2b837fa3fc655120a230e1e04aec1c92cbd82c
├── [ 418] docker-compose.yml
├── [ 257] Dockerfile
├── [4.0K] imgs
│ └── [399K] cve-2018-1111.gif
├── [1.0K] LICENSE
├── [ 625] README.md
└── [4.0K] scripts
├── [ 336] attack.sh
└── [ 118] victim.sh
2 directories, 7 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。