Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2023-1521 PoC — Local Privilege Escalation in sccache

Source
Associated Vulnerability
Title:Local Privilege Escalation in sccache (CVE-2023-1521)
Description:On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.
Readme
## PoC

```bash
gcc -shared -o libpoc.so poc.c -fPIC
export LD_PRELOAD=fullpath_to_libpoc.so
sccache gcc foo.c -o foo
```
File Snapshot

[4.0K] /data/pocs/7c59d29211262a4f296006c8f93809d91c4c4aa3 ├── [ 78] foo.c ├── [ 472] poc.c └── [ 121] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →