关联漏洞
介绍
# CVE-2022-2588
Code adapted for one cpu, and with a vagrant file provided to boot up a vulnerable machine used for educational purposes.
To create a vulnerable machine, you need to have [Vagrant](https://www.vagrantup.com/) installed on your machine, then execute on the repository root:
```sh
Vagrant up
```
Wait for installation and booting then :
```sh
Vagrant ssh
```
Inside the Vm:
```sh
cd CVE-2022-2588/ && gcc ./exploit.c -o exploit -lpthread
./exploit
```
then:
```sh
su ensimag
password: #ensimag
#
```
The original exploit code : [here](https://github.com/Markakd/CVE-2022-2588)
To prevent the exploit try to uncomment the line 15 and 18 and restart the process.
文件快照
[4.0K] /data/pocs/ae7c21ff367ecea5230e217816de070a6ad06e17
├── [ 261] CMakeLists.txt
├── [ 22K] exploit.c
├── [ 729] README.md
└── [1.6K] Vagrantfile
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。