Skip to content

siegfrkn/CSCI5403_CVE20220847_Detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

55 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CSCI5403_CVE20220847_Detection

Summary

This repository hosts the instructions to setup an environment, perform the dirtypipe CVE20222847 exploit, and a proof-of-concept (POC) scanning demo which demonstrates how a cache manipulation exploit such as dirtypipe can be detected in real time.

Description

The dirtypipe exploit takes advantage of a vulnerability that allows a user with only read-only privledges to root-owned files, the ability to make modifications to the cached copy of a file, while the actual contents of the file on the disk remains untouched and unmodified. This allows a read-only user to escalate to root during a single session. When that cache is flushed or the user ends the session, all traces of the exploit will be removed. The original discovery of this exploit was only made due to a series of strange log file artifacts.

Additional detail about the original exploit are detailed by the discovering engineer here.

Video Demonstration

A video of the exploit and live detection can be found here.

Team Links

Resources

DirtyPipe

Linux

VirtualBox

Root Escalations

C Programming

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages