当前位置:网站首页>Cve-2019-14287 (sudo right raising)
Cve-2019-14287 (sudo right raising)
2022-06-23 04:52:00 【Ink mark vs. breeze】
Affected by Sudo edition
Version number < 1.8.28 Of Sudo All versions will be affected by this vulnerability .
Bug repair
Sudo v1.8.28 Version has fixed this vulnerability , Broad recommendations Linux As soon as possible, the user will manually sudo Update the package to the latest version .
Reappear CVE-2019-14287 Loophole
principle :Sudo The full name is "superuserdo”, It is Linux System management instruction , Allows users to switch environments without having to , Run applications or commands with the privileges of other users , Usually with root Run command as user , In order to reduce root User login and management time , At the same time, improve security , When in Linux When executing commands on the operating system , Only with permission or knowledge root password , Only ordinary users can use sudo Command to root Identity execution command .
Personal understanding :( To put it bluntly, it means , If you invade someone else's host , This vulnerability can be exploited , Upgrade permissions , No switching root, Because switching root You need to enter the password when you need to , With this vulnerability, you can skip this step , Get permission )
Then start practicing !
1. open contos7 liunx System
( How to install a virtual machine , No, it's too simple )

2. Deploy an environment that can implement the vulnerability
3. View version
command :sudo -V

4. Network information needs to be configured
command : vim /etc/sudoers

5. find root That's ok , stay root Add a command to the next line
command :test ALL=(ALL,!root) ALL
The first one here ALL On behalf of users can use our... Anywhere sudo( Simply speak , If every family has intelligent air conditioning , You can remotely operate your air conditioner at any place , That's why )
(ALL,!root) The meaning of this command is very simple , Except for root Other users cannot use sudo This command
the last one ALL Indicates that is allowed to execute

When the input is complete , Save and exit vim( If not here , Please study vim Use of commands )
6. Exploit loopholes
(1) So let's create one test user , And after creating the password, switch to test user
command ; newly build ;passwd test
Switch ;su test
useradd -m test
passwd test
(2) There's a problem

sudo -u#1 idTest The user does not have permission to use root Identity login
So how to solve it ?
Enter the command ;sudo -u#1 id( This is the embodiment of this loophole , In principle, we limit test Out-of-service root The order of , But through this loophole Successfully obtained root jurisdiction )
In this way, the problem can be solved
边栏推荐
猜你喜欢

Principle of 8-bit full adder
Laravel中使用 Editor.md 上传图片如何处理?

Abnova acid phosphatase (wheat germ) instructions

ADR electronic transmission EDI solution of national adverse drug reaction monitoring center

在Pycharm中使用append()方法对列表添加元素时提示“This list creation could be rewritten as a list literal“的解决方法

McKinsey: in 2021, the investment in quantum computing market grew strongly and the talent gap expanded

volatile 与线程的那些事

Cocos learning diary 2 - scripts and attributes

Abnova ACTN4纯化兔多克隆抗体说明书

20000 words + 20 pictures | details of nine data types and application scenarios of redis
随机推荐
Abnova 血液总核酸纯化试剂盒方案
如何解决独立站多渠道客户沟通难题?这款跨境电商插件一定要知道!
Pta:7-58 Book audio-visual rental management
Examples of corpus data processing cases (part of speech encoding, part of speech restoration)
Abnova blood total nucleic acid purification kit protocol
Flask基础:环境搭建+配置+URL与试图之间的映射+重定向+数据库连接
距离度量 —— 余弦距离(Cosine Distance)
Laravel customizes the paging style through the service provider
STL教程3-异常机制
不归零编码NRZ
Pta:6-71 clock simulation
AD9使用技巧拾遗
ADR electronic transmission EDI solution of national adverse drug reaction monitoring center
Freemodbus parsing 1
PCB placing components at any angle and distance
Reinstallation of cadence16.3, failure and success
Abnova 荧光染料 510-M 链霉亲和素方案
OpenJudge NOI 1.13 50:数根
volatile 与线程的那些事
Abnova fluorescent dye 555-c3 maleimide scheme