Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-19788 PoC — Red Hat PolicyKit 输入验证错误漏洞

Source
Associated Vulnerability
Title:Red Hat PolicyKit 输入验证错误漏洞 (CVE-2018-19788)
Description:A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
Description
Silly easy exploit for CVE-2018-19788
Readme
# CVE-2018-19788
Silly easy exploit for CVE-2018-19788

To use this, you must either create a user with UID > INT_MAX in Policy Kit or already have a low-priv user with said UID.

UID can be specified in user creation as follows, and used before execution of the script:

```bash
$ useradd -u 4000000001 PrivEsc
$ passwd PrivEsc
$ su PrivEsc
$ chmod +x /tmp/CVE-2018-19788_PrivEsc.sh
$ ./tmp/CVE-2018-19788_PrivEsc.sh
```

Please note this is merely for research and you are responsible for your own usage of any code found in this repository or any other, as common sense dictates.
File Snapshot

[4.0K] /data/pocs/99535a92e15289286106db0fdd478c79491c68b5 ├── [1.2K] CVE-2018-19788_PrivEsc.sh ├── [ 34K] LICENSE └── [ 583] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →