Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3560 PoC — polkit 代码问题漏洞

Source
Associated Vulnerability
Title:polkit 代码问题漏洞 (CVE-2021-3560)
Description:It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Description
Polkit - Local Privilege Escalation (CVE-2021-3560)
Readme
# CVE-2021-3560

## Polkit - Local Privilege Escalation

Original discovery by [kevin_backhouse](https://twitter.com/kevin_backhouse) from [GitHub Security Lab](https://twitter.com/GHSecurityLab)

## References

- [https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/](https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/)
- [https://www.youtube.com/watch?v=QZhz64yEd0g](https://www.youtube.com/watch?v=QZhz64yEd0g)
- [https://ubuntu.com/security/CVE-2021-3560](https://ubuntu.com/security/CVE-2021-3560)

## Blog
- [https://deathflash.ml/blog/polkit-local-privilege-escalation](https://deathflash.ml/blog/polkit-local-privilege-escalation)

File Snapshot

[4.0K] /data/pocs/ab7edb1a75def0288aaca458af73a24589ce2df5 ├── [2.7K] CVE-2021-3560.py └── [ 702] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →