Skip to content

This modified exploit of the original exploit by @init_string, takes the command to execute from the command line and runs it as root. No need to compile the snap file evertime for a new payload.

License

Dhayalanb/Snapd-V2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Snapd V2

Modified version of the original code found here

This modified exploit of the original exploit by @init_string, takes the command to execute from the command line and runs it as root. This removes the need to compile a snap everytime one needs to run a different command.

Usage : python CVE-2019-7304.py "touch /root/MUHAHA"

CAUTION

If the systems is connected to the internet, it is better to run the original exploit here. As sideloading a snap will force an upgrade on snapd on some versions of Ubuntu. So you would want that command to be a good one. :)

Original Finder : @init_string
Edited : @D3fa1t

About

This modified exploit of the original exploit by @init_string, takes the command to execute from the command line and runs it as root. No need to compile the snap file evertime for a new payload.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages