Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-14287 PoC — Sudo 输入验证错误漏洞

Source
Associated Vulnerability
Title:Sudo 输入验证错误漏洞 (CVE-2019-14287)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 sudo 1.8.28之前版本中存在安全漏洞。攻击者可利用该漏洞以root权限运行命令。
Description
Containerized and deployable use of the CVE-2019-14287 vuln. View README.md for more.
Readme
# Dockerized CVE-2019-14287
 Containerized and deployable use of the [**CVE-2019-14287**](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287) vuln. View README.md for more.

This CVE affects all versions of **sudo under 1.8.28** where a sudo user can escalate to root by referencing its user ID.


This Dockerfile allows this CVE to be built, where it can be used for CTF's and demonstrations for example.

Shoutout to [MuirlandOracle](https://muirlandoracle.co.uk/) for reaching out to me for help regarding dockerising this CVE. MurilandOracle has released a room on [TryHackMe](https://tryhackme.com/room/sudovulns) where this CVE is exploited and explained - he does an excellent job of explaining how it works.

I highly reccommend you check out the room specifically - but moreover the [TryHackMe](https://tryhackme.com) platform itself.

~ [CMNatic](https://cmnatic.co.uk)

## To build:

Either clone repo, or download contents of "Dockerfile" to local machine:

`` git clone https://github.com/CMNatic/Dockerized-CVE-2019-14287/ ``

### or simply pull from the Docker Hub
as it uses an SSH server, port 22 is exposed - please feel free to address this port to any port that is not in use on your host.

1.  `docker run -d -p 2222:22 cmnatic/cve-2019-14287-demo `

Login to container:

Using default credentials:
  Username: uogctf
  Password: uogctf

   1. `ssh -l uogctf 127.0.0.1 -p 2222`

Then attempt the CVE.

for reference, **root** user is available to login using **uogctf**


## [MITRE - CVE-2019-14287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287)


## [MuirlandOracle's THM Room](https://tryhackme.com/room/sudovulns)

## [DockerHub Entry](https://hub.docker.com/r/cmnatic/cve-2019-14287-demo)
File Snapshot

[4.0K] /data/pocs/81e870188f4752f65c37ede3ef2609259fb5f95f ├── [1.1K] Dockerfile └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.