Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3156 PoC — Sudo 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Sudo 缓冲区错误漏洞 (CVE-2021-3156)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.5p2 之前版本存在缓冲区错误漏洞,攻击者可使用sudoedit -s和一个以单个反斜杠字符结束的命令行参数升级到root。
Description
checking CVE-2021-3156 vulnerability & patch script
Readme
# CVE-2021-3156
## checking CVE-2021-3156 vulnerability & patching script

CVE-2021-3156 description:

Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.


### To check for CVE-2021-3156 vulnerability:
```
python3 CVE-2021-3156_checker.py
```

### To patch CVE-2021-3156 vulnerability:
```
chmod +x ./CVE-2021-3156_patcher.sh && ./CVE-2021-3156_patcher.sh
```

### PoC image can be found in /PoC_Images directory.
File Snapshot

[4.0K] /data/pocs/e3ad88284b6dcb2c19f6f74c185f48ed43013757 ├── [ 768] CVE-2021-3156_checker.py ├── [ 742] CVE-2021-3156_patcher.sh ├── [4.0K] PoC_Images │   ├── [ 85K] 1. vulnerability_found.png │   ├── [ 62K] 2. after_exec_patcher_script.png │   └── [ 97K] 3. run_checker_again_and_it_safe.png └── [ 545] README.md 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.