Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2021-3560 PoC — polkit 代码问题漏洞

Source
Associated Vulnerability
Title:polkit 代码问题漏洞 (CVE-2021-3560)
Description:It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Description
Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability.
Readme
# Description 
As part of my cybersecurity thesis I wanted to create an exploit for a vulnerability.

I HIGHLY recommend reading this guide, as this exploit is based on it:

https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/

Also, check out this repo, as i took inspiration from it:

https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py

This code is by no means perfect, sometimes it gets a bit buggy if you set a password for the new user.

I recommend NOT setting a password.

If it does not create a new user, simply retry a few times and it will eventually work.

if you have any advices on how to improve this code, please, feel free to share them :) !



# Disclaimer

The tools and exploits provided in this repository are released for educational and research purposes only. 

The author is not responsible for any misuse or damage that may be caused by the tools or exploits. 

Users are strongly encouraged to use these resources responsibly and ethically, adhering to applicable laws and regulations. 

The author supports ethical hacking and responsible disclosure, and strongly discourages malicious use of these resources.

By using this repository, you agree that you understand the contents of this disclaimer and that you will comply with the terms and conditions outlined.

File Snapshot

[4.0K] /data/pocs/2106dd51da1733bd2a832835e125b71c73963030 ├── [4.1K] exploitBAD.py ├── [3.2K] exploit.py ├── [1.0K] LICENSE └── [1.3K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →