Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-13272 PoC — Linux kernel 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Linux kernel 权限许可和访问控制问题漏洞 (CVE-2019-13272)
Description:In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Description
The exploit for CVE-2019-13272
Readme
# CVE-2019-13272
The exploit for CVE-2019-13272

漏洞类型:Linux本地提权

漏洞影响范围:Linux内核版本低于5.1.17

本地测试环境:

![](./system.jpg)

![](./cve-2019-13272.jpg)

漏洞相关信息:

https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
File Snapshot

[4.0K] /data/pocs/62fa874d82e9827bd3ce453e3d01884f7057965f ├── [ 12K] cve-2019-13272_exp.c ├── [475K] cve-2019-13272.jpg ├── [ 290] README.md └── [185K] system.jpg 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →