关联漏洞
描述
Sudo Security Bypass (CVE-2019-14287)
介绍
# Sudo-Security-Bypass-CVE-2019-14287
===========================================================================
██████╗██╗ ██╗███████╗ ██████╗ ██████╗ ██╗ █████╗ ██╗██╗ ██╗██████╗ █████╗ ███████╗
██╔════╝██║ ██║██╔════╝ ╚════██╗██╔═████╗███║██╔══██╗ ███║██║ ██║╚════██╗██╔══██╗╚════██║
██║ ██║ ██║█████╗█████╗ █████╔╝██║██╔██║╚██║╚██████║█████╗╚██║███████║ █████╔╝╚█████╔╝ ██╔╝
██║ ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║ ██║ ╚═══██║╚════╝ ██║╚════██║██╔═══╝ ██╔══██╗ ██╔╝
╚██████╗ ╚████╔╝ ███████╗ ███████╗╚██████╔╝ ██║ █████╔╝ ██║ ██║███████╗╚█████╔╝ ██║
╚═════╝ ╚═══╝ ╚══════╝ ╚══════╝ ╚═════╝ ╚═╝ ╚════╝ ╚═╝ ╚═╝╚══════╝ ╚════╝ ╚═╝
Sudo Security Bypass Test
========= By Vivek Yadav (www.shallvhack.com)=========
=============================================================================
<p align="center">
<p align="center">
<a href="https://www.gnu.org/software/bash/"><img alt="language" src="https://img.shields.io/badge/Lang-Bash%204.2+-blue.svg"></a>
<a href="https://twitter.com/intent/follow?screen_name=shallvhack"><img alt="language" src="https://img.shields.io/twitter/follow/shallvhack?label=Follow%20%20ShallVhack&style=social"></a>
</p>
</p>
# Vulnerability Description
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
# Script Description
This is a simple Proof of concept to test for recently disclosed Sudo Security Bypass vulnerability known as CVE-2019-14287.
# Recommendation
The best suggession for now would be to update the sudo to the version 1.8.28 or above.
# Contact me on:
Website: www.shallvhack.com
Twitter : www.twitter.com/shallvhack
Facebook : www.facebook.com/shallvhack
Github : https://github.com/shallvhack
LinkedIn : https://in.linkedin.com/in/vyvivekyadav04
文件快照
[4.0K] /data/pocs/87259980fe19494b775161086031c69665e76ac5
├── [1.0K] LICENSE
├── [3.1K] README.md
└── [3.0K] SudoSecurityBypass.sh
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。