Linux

Index

Dirty Pipe

Exploitarrow-up-right kernel from 5.8 to 5.17

sudo apt-get install gcc
chmod +x compile.sh
./compile.sh
./exploit-1
# change the root password in the /etc/passwd file and get an elevated shell.

Screen 4.5.0

Exploitarrow-up-right

If you cannot compile on the machine

Sudo - Baron Samedit

Exploitarrow-up-right sudo 1.8.21 | 1.8.31 | 1.8.27 | 1.9.2 | other

Sudo - Chroot

Exploitarrow-up-right sudo 1.9.14 up to 1.9.17

Sudo - Runas ALL

Exploitarrow-up-right sudo < 1.8.28

Exploiting the bug requires that the user have sudo privileges that allow them to run commands with an arbitrary user ID. Typically, this means that the user’s sudoers entry has the special value ALL in the Runas specifier.

ex. alice myhost = (ALL) /usr/bin/id

If a sudoers entry is written to allow the user to run a command as any user except root, the bug can be used to avoid this restriction.

ex. bob myhost = (ALL, !root) /usr/bin/vi

PwnKit - Polkit

Exploit1arrow-up-right / Exploit2arrow-up-right Polkit < 0.105-26

Logrotate

Exploitarrow-up-right Logrotate 3.8.6 | 3.11.0 | 3.15.0 | 3.18.0

You have to find log files on which logrotate is run and on which you have write permissions. Then run exploit on the writable log file.

Prepare payload

If "create"-option is set in logrotate.cfg:

If "compress"-option is set in logrotate.cfg:

Last updated