Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16125 PoC — gdm3 代码问题漏洞

Source
Associated Vulnerability
Title:gdm3 代码问题漏洞 (CVE-2020-16125)
Description:gdm3是一款GNOME显示管理器,它提供图形化登录,并能够处理用户身份验证。 gdm3 3.36.2和3.38.2之前的版本存在代码问题漏洞,该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。
Readme
# CVE-2020-16125-Reproduction
This repository is aimed at reproducing the attack . 

Description :
  Its original name is “Ubuntu gdm3 privilege escalation” , and it is found by a Github
security researcher named Kevin Backhouse . Its CVSS score is 4.6/10 (medium) and the
affected environment is Ubuntu version 20.04.1 with gdm3 version before 3.36.2 or 3.38.2 .
  The vulnerability is very easy to reproduce, and its influence is quite critical.

Analysis :
  The vulnerability is due to the unpredictable chain reaction between gdm3 and
Ubuntu due to their mechanism. Gdm3 with version before 3.36.2 or 3.38.2 would start
gnome-initial-setup if gdm3 can’t contact the accountservice via dbus in a timely manner
.Therefore, if the attacker can crash the accountservice, then the gnome-initial-setup will be
triggered ,and the attacker will be able to create a new privileged account (who has the
same privilege as root). Unfortunately, on Ubuntu with the early version, this can be done
by several simple steps since there’s a way to make accountsservice daemon process to
enter an infinite loop, which makes itself unresponsive. On the other hand, the vulnerability
is hard to be prevented, and it seems that the only way to prevent it is to update Ubuntu or
gdm3 to the new version.
File Snapshot

[4.0K] /data/pocs/a8283a8a8c30c261cc16626bbe962190c182242e ├── [ 228] code.txt ├── [1.3K] README.md └── [557K] report.pdf 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.