ExploitEoom/CVE-2026-31431

GitHub: ExploitEoom/CVE-2026-31431

针对 Linux 内核 CVE-2026-31431(CopyFail)漏洞的本地提权利用工具集,涵盖漏洞验证、提权利用和受损恢复。

Stars: 2 | Forks: 0

# CVE-2026-31431 Offensive ## CopyFail 标准二进制文件 在 获取所有最新 CVE 警报 ``` mail :: ~/Desktop/CVE-2026 » file * exploit: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, BuildID[sha1]=9454dbdde0ac2d1a8981c06db89f24a4753ec3b7, for GNU/Linux 3.2.0, not stripped payload: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=9b0f16503767336bc8a821482933c1111aafa23a, stripped verify_vulneurable: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, BuildID[sha1]=a79c6ab7e9d14e60af8d7dfc1c102e3bc93a910b, for GNU/Linux 3.2.0, not stripped mail :: ~/Desktop/CVE-2026 » ``` ## 如何使用 ``` git clone https://github.com/ExploitEoom/CVE-2026-31431.git cd CVE-2026-31431 chmod +x * ./verify_vulneurable ./exploit ``` https://github.com/user-attachments/assets/27e0f28e-0cb8-438d-9fe4-ebd56035adad ## 理解被利用的部分 image The id changed from 1000 to 0000 ## 意外造成损害如何恢复 Screenshot From 2026-05-01 19-11-25 We cant operate some system commands Screenshot From 2026-05-01 19-10-30 Go as root using sudo su or use ./exploit then search the user you run the exploit Screenshot From 2026-05-01 19-11-41 Replace the 0000 to 1000 Screenshot From 2026-05-01 19-11-57 Here you have back your user ## 需要立即采取的行动: 1. 临时缓解措施 – (检查 algif_aead 是否正在使用) 运行: ``` lsmod | grep algif_aead ``` 无输出(未在使用)→ 运行以下禁用命令 ``` echo "install algif_aead /bin/false" | sudo tee /etc/modprobe.d/disable-algif-aead.conf sudo rmmod algif_aead 2>/dev/null || true ``` 2. 永久修复(在执行前仔细评估业务兼容性) Debian/Ubuntu: sudo apt update && sudo apt upgrade -y CentOS/RHEL/Rocky/Alma: sudo dnf update -y 补丁:https://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5
标签:CopyFail, CSV导出, CVE-2026-31431, ELF可执行文件, Exploit, Linux漏洞利用, LPE, Maven, Offensive Security, Root权限, UID修改, Web报告查看器, x86-64, 协议分析, 安全渗透, 攻击脚本, 数据展示, 本地提权, 权限提升, 漏洞复现, 漏洞验证, 系统提权, 红队, 网络安全, 隐私保护, 静态编译