支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: e7745100f35e3d968e3ff31096d488a5ae32c371

来源
关联漏洞
标题:below 安全漏洞 (CVE-2025-27591)
描述:below是Meta Incubator开源的一个现代 Linux 系统的资源监视器。 below v0.9.0之前版本存在安全漏洞,该漏洞源于创建了全局可写目录,可能导致通过符号链接攻击提升到root权限。
描述
self cleaning CVE-2025-27591 Poc that grants a root reverse shell instead of modifying passwd files
介绍
# CVE-2025-27591

# introduction

`below` versions < `v0.9.0` are vulnerable to a local privilege escalation vulnerability duo to the fact that the program creates a world-writable log file, an a world writable log file instead, the attacker can replace the log file with a symblink to any system-critical file and be able to edit it in order to login as root

the following vulnerablity targets `/etc/ld.so.preload` to pop a reverse shell as root, cleaning all indicators of compromise before doing so

the vulnerability is only exploitable on systems that ship with installation packages that don't create the log file directory, or create it with a specific permissions, and/or rely on the program to create the log directory instead, such systems include : ubuntu, arch linux, gentoo ..

# cve analysis

coming soon ..

# usage
change the IP and port on the exploit code and compile it on your machine
```bash
$ bash compile.sh
```

then copy it the shared library and the exploit script to the same folder on the remote machine and run it

```bash
$ bash exploit.sh
```

# references
- [openwall discussion](https://www.openwall.com/lists/oss-security/2025/03/12/1)
- [facebook advisory](https://www.facebook.com/security/advisories/cve-2025-27591)
- [github advisory](https://github.com/advisories/GHSA-9mc5-7qhg-fp3w?utm_source=chatgpt.com)
- [github patch](https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3)
- [BridgerAlderson's exploit](https://github.com/BridgerAlderson/CVE-2025-27591-PoC) 
文件快照

[4.0K] /data/pocs/e7745100f35e3d968e3ff31096d488a5ae32c371 ├── [ 118] compile.sh ├── [1.4K] exploit.sh ├── [1.5K] README.md └── [ 856] shared.c 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。