Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000367 PoC — Sudo 输入验证错误漏洞

Source
Associated Vulnerability
Title:Sudo 输入验证错误漏洞 (CVE-2017-1000367)
Description:Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
Readme
# sudo-CVE-2017-1000367

http://www.openwall.com/lists/oss-security/2017/05/30/16

- Compile: gcc -o sudopwn sudopwn.c -lutil
- Disclaimer: I had no clue what I was doing ;-)

## Requirements

- System must be selinux-enabled
- sudo needs to be built with selinux support (sudo -r)
- User needs to have sudo permissions e.g. "toor ALL=(ALL) NOPASSWD: /usr/bin/sum"


![](Screenshot_2017-06-05_21-40-38.png)
File Snapshot

[4.0K] /data/pocs/3ae1e8c8ef45a9a69a0c6b9d9e5ae4cc51e6d4b3 ├── [ 407] README.md ├── [ 75K] Screenshot_2017-06-05_21-40-38.png └── [2.2K] sudopwn.c 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →