Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-18955 PoC — Linux kernel 输入验证错误漏洞

Source
Associated Vulnerability
Title:Linux kernel 输入验证错误漏洞 (CVE-2018-18955)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。 Linux kernel 4.15.x版本至4.19.2之前的4.19.x版本中的kernel/user_namespace.c文件的‘map_write()’函数存在安全漏洞。攻击者可利用该漏洞绕过对资源的访问控制。
Description
💀 Linux local root exploit for CVE-2018-18955
Readme
<h1 align='center'>CVE-2018-18955</h1>

Linux local root exploit.

Wrapper for Jann Horn's
[exploit](https://bugs.chromium.org/p/project-zero/issues/detail?id=1712) for
[CVE-2018-18955](https://nvd.nist.gov/vuln/detail/CVE-2018-18955), forked from
[kernel-exploits](https://github.com/bcoles/kernel-exploits).

In the Linux  kernel 4.15.x through 4.19.x  before 4.19.2, `map_write()`
in  `kernel/user_namespace.c`  allows  privilege escalation  because  it
mishandles nested user namespaces with more  than 5 UID or GID ranges. A
user who  has `CAP_SYS_ADMIN` in  an affected user namespace  can bypass
access controls on  resources outside the namespace,  as demonstrated by
reading `/etc/shadow`.  This occurs  because an ID  transformation takes
place properly  for the namespaced-to-kernel  direction but not  for the
kernel-to-namespaced direction.

### Usage

Simply download  one of the  release archives and  run one of  the shell
scripts depending on the targeted exploitation technique.

### Disclaimer

Running unathorized attacks to public or private servers is illegal. The
content  of this  repository is  for  educational purposes  only and  no
responsibility will be  taken by the authors  in case of ill  use of the
provided material.
File Snapshot

[4.0K] /data/pocs/84d45efd638346469cc6f35e37c53c58be58c3ce ├── [2.4K] exploit.bash_completion.sh ├── [2.6K] exploit.cron.sh ├── [4.1K] exploit.dbus.sh ├── [2.4K] exploit.ldpreload.sh ├── [3.1K] exploit.polkit.sh ├── [ 357] libsubuid.c ├── [1.2K] README.md ├── [ 147] rootshell.c ├── [1.8K] subshell.c └── [6.4K] subuid_shell.c 0 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.