Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/inspiringz/CVE-2021-3493
CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
https://github.com/inspiringz/CVE-2021-3493
cve-2021-3493 exploit linux privesc ubuntu
Last synced: 22 days ago
JSON representation
CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)
- Host: GitHub
- URL: https://github.com/inspiringz/CVE-2021-3493
- Owner: inspiringz
- Created: 2021-07-07T06:16:48.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2021-07-07T07:19:03.000Z (over 3 years ago)
- Last Synced: 2024-08-05T17:25:08.726Z (4 months ago)
- Topics: cve-2021-3493, exploit, linux, privesc, ubuntu
- Language: C
- Homepage:
- Size: 898 KB
- Stars: 38
- Watchers: 1
- Forks: 9
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - inspiringz/CVE-2021-3493 - CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered) (C)
README
# CVE-2021-3493
![sample](images/sample.png)
Ubuntu OverlayFS Local Privesc
## Description
"Ubuntu specific issue in the overlayfs file system in the Linux kernel where it did not properly validate the application of file system capabilities with respect to user namespaces. A local attacker could use this to gain elevated privileges, due to a patch carried in Ubuntu to allow unprivileged overlayfs mounts." [- Ubuntu Security](https://ubuntu.com/security/CVE-2021-3493)
> Fixed in Linux 5.11
## Affected Versions
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 19.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM> checklist: https://ubuntu.com/security/CVE-2021-3493
## Usage
- ```gcc exploit.c -o exploit```
- ```chmod +x exploit```
- ```./exploit shell|command```## References
- https://github.com/briskets/CVE-2021-3493