POC详情: 81e870188f4752f65c37ede3ef2609259fb5f95f

来源
关联漏洞
标题: Sudo 输入验证错误漏洞 (CVE-2019-14287)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 sudo 1.8.28之前版本中存在安全漏洞。攻击者可利用该漏洞以root权限运行命令。
描述
Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.
介绍
# Dockerized CVE-2019-14287
 Containerized and deployable use of the [**CVE-2019-14287**](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287) vuln. View README.md for more.

This CVE affects all versions of **sudo under 1.8.28** where a sudo user can escalate to root by referencing its user ID.


This Dockerfile allows this CVE to be built, where it can be used for CTF's and demonstrations for example.

Shoutout to [MuirlandOracle](https://muirlandoracle.co.uk/) for reaching out to me for help regarding dockerising this CVE. MurilandOracle has released a room on [TryHackMe](https://tryhackme.com/room/sudovulns) where this CVE is exploited and explained - he does an excellent job of explaining how it works.

I highly reccommend you check out the room specifically - but moreover the [TryHackMe](https://tryhackme.com) platform itself.

~ [CMNatic](https://cmnatic.co.uk)

## To build:

Either clone repo, or download contents of "Dockerfile" to local machine:

`` git clone https://github.com/CMNatic/Dockerized-CVE-2019-14287/ ``

### or simply pull from the Docker Hub
as it uses an SSH server, port 22 is exposed - please feel free to address this port to any port that is not in use on your host.

1.  `docker run -d -p 2222:22 cmnatic/cve-2019-14287-demo `

Login to container:

Using default credentials:
  Username: uogctf
  Password: uogctf

   1. `ssh -l uogctf 127.0.0.1 -p 2222`

Then attempt the CVE.

for reference, **root** user is available to login using **uogctf**


## [MITRE - CVE-2019-14287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287)


## [MuirlandOracle's THM Room](https://tryhackme.com/room/sudovulns)

## [DockerHub Entry](https://hub.docker.com/r/cmnatic/cve-2019-14287-demo)
文件快照

[4.0K] /data/pocs/81e870188f4752f65c37ede3ef2609259fb5f95f ├── [1.1K] Dockerfile └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。