Skip to content

Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)

Notifications You must be signed in to change notification settings

elvi7major/snap_priv_esc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

snap_priv_esc

Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)

What is snap?

Snap is a software packaging and deployment system developed by Canonical for the operating systems that use the Linux kernel. The packages, called snaps, and the tool for using them, snapd, work across a range of Linux distributions and allow upstream software developers to distribute their applications directly to users. Snaps are self-contained applications running in a sandbox with mediated access to the host system. Snap was originally released for cloud applications[1] but was later ported to work for Internet of Things devices[3][4] and desktop[5][6] applications too.

other snap's esploits :

dirty_sock: Linux Privilege Escalation (via snapd)

exploit (without 'snapd' just snap )

this exploit needs

- snap installed on system
- you have sudo with or without password on snap

Usage :

./exp.sh "snap_path" "pwd"
ex:
	./exp.sh "/usr/bin/snap" "/home/evil"

then you can use

su - dirty_sock
dirty_sock (as password)
sudo bash

About

Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages