-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exploit fails on Debian cloud image #3
Comments
I was trying with docker image of ubuntu 20.04 and facing same issue, its first asking for password then giving this message user@36994e126440:~/CVE-2021-3156$ ./sudo-hax-me-a-sandwich 0 |
@MattyAgain is there an easy way to get access to a Debian Openstack VM? I tried converting the qcow2 to vdi using |
@blasty have you tried this exploit with ubuntu 20.04 docker image? |
@blasty Here's a zip of a VirtualBox folder for a Debian OpenStack VM: https://drive.google.com/file/d/1GeaE3jNmmBecHfUIrKBgSKeCJqX9nwsk/view?usp=sharing Unfortunately, I wasn't able to export it as an OVA because of how the disk is configured, but you should be able to copy the folder to your VirtualBox VMs folder and run it from there. Worst case if it doesn't work, I can spin up a VPS with the same cloud kernel and grant you access to it. It uses NAT networking. The port forwarding rule is Host 2222 -> Guest 22, so |
@MattyAgain thanks for the zip file, VM works a charm. Unfortunately I was not able to get the exploit working so far. I might investigate more but no promises when. (Being flooded with "look into support for distro/version XYZ" at the moment) |
Understood @blasty. I was perplexed because the binary and shared libraries seem to be identical on both systems. Something I recently noticed is that |
Hi,
Thanks for this really convenient exploit. I was able to get it working on my Debian 10 and Ubuntu 20.04 machines.
However, I noticed it failed on one of my Debian Cloud (OpenStack) virtual machines. The VM in question is running the linux-image-4.19.0-13-cloud-amd64 kernel, which is used by many cloud providers.
When I execute
sudo-hax-me-a-sandwich 1
on this system, it prompts for a password, even though the user account has no sudo access and was created using--disabled-password
(it has no password associated with it):Running the exploit from a user that does have a password also causes the prompt. When I enter the password, the message "userwithpass is not in the sudoers file. This incident will be reported." is returned. And I made sure the installed version of sudo is vulnerable;
sudoedit -s '\' $(perl -e 'print "A" x 65536')
causes a crash.The text was updated successfully, but these errors were encountered: