Skip to content

chanbakjsd/CVE-2019-18634

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2019-18634

This is a basic reproduction of CVE-2019-18634, a privilege escalation exploit in sudo with pwfeedback enabled. This was created as part of a project for NTU SC3010 to demonstrate a security vulnerability.

To reproduce the exploit, a Docker image of Ubuntu 20.04 was used. A vulnerable sudo version is then installed and configured to enable the vulnerable exploit.

At that time, Ubuntu did not have this option enabled by default which helped minimize the impact but the severity of the exploit still gave it a severity score of 7.8.

pwfeedback is an option which prints out asterisks when the user types their password for visual feedback.

Run

  1. Build the image using develop.sh.
  2. Run the image with $DOCKER run -i --tty ubuntu:vulnerable-sudo Note that a tty is required to interact with sudo in a reasonable manner.
  3. Observe that you do not have privileges to run sudo in the image
  4. Run ./sudo_sudo <command> to execute the exploit script.

Useful Resources

About

A reproduction of CVE-2019-18634, sudo privilege escalation with buffer overflow.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published