SkillAgentSearch skills...

Dirtypipe

DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.

Install / Use

/learn @drapl0n/Dirtypipe
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

About:

  • Title: DirtyPipe
  • Description: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges.
  • AUTHOR: drapl0n
  • Version: 1.0
  • Category: Execution
  • Target: Linux operating systems.
  • Attackmodes: HID, Storage

DirtyPipe: Exploit for a new Linux vulnerability known as 'Dirty Pipe(CVE-2022-0847)' allows local users to gain root privileges. The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.

Directory Structure of payload components:

| FileName | Directory | | -------------- | ----------------------------- | | payload.txt | /payloads/ | | dirtypipe.c | /payloads/library/ |

LED Status:

  • SETUP : MAGENTA
  • ATTACK : YELLOW
  • FINISH : GREEN

Support me if you like my work:

  • https://twitter.com/drapl0n
View on GitHub
GitHub Stars7
CategoryDevelopment
Updated1y ago
Forks2

Languages

C

Security Score

60/100

Audited on Aug 12, 2024

No findings