mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
6.3 KiB
6.3 KiB
CVE-2021-3560
Description
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
POC
Reference
- http://packetstormsecurity.com/files/172836/polkit-Authentication-Bypass.html
- https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
Github
- https://github.com/0dayNinja/CVE-2021-3560
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsmirk/vehicle-kernel-exploit
- https://github.com/0xsyr0/OSCP
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Aijoo100/Aijoo100
- https://github.com/Almorabea/Polkit-exploit
- https://github.com/AnastasiaLomova/PR1
- https://github.com/AnastasiaLomova/PR1.1
- https://github.com/AssassinUKG/Polkit-CVE-2021-3560
- https://github.com/BEPb/tryhackme
- https://github.com/BigMike-Champ/Capstone
- https://github.com/BizarreLove/CVE-2021-3560
- https://github.com/CharonDefalt/linux-exploit
- https://github.com/Desm0ndChan/OSCP-cheatsheet
- https://github.com/DrewSC13/Linpeas
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/GibzB/THM-Captured-Rooms
- https://github.com/HadessCS/Awesome-Privilege-Escalation
- https://github.com/Ignitetechnologies/Linux-Privilege-Escalation
- https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT
- https://github.com/LucasPDiniz/CVE-2021-3560
- https://github.com/LucasPDiniz/StudyRoom
- https://github.com/Ly0nt4r/OSCP
- https://github.com/Meowmycks/OSCPprep-Cute
- https://github.com/Meowmycks/OSCPprep-Sar
- https://github.com/Meowmycks/OSCPprep-hackme1
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NxPnch/Linux-Privesc
- https://github.com/OlegBr04/Traitor
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Qwertozavr/PR1_3
- https://github.com/Qwertozavr/PR1_3.2
- https://github.com/Qwertozavr/PR1_TRPP
- https://github.com/RACHO-PRG/Linux_Escalada_Privilegios
- https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent
- https://github.com/STEALTH-Z/CVE-2021-3560
- https://github.com/SYRTI/POC_to_review
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/TieuLong21Prosper/CVE-2021-3560
- https://github.com/TomMalvoRiddle/CVE-2021-3560
- https://github.com/UNICORDev/exploit-CVE-2021-3560
- https://github.com/WhooAmii/POC_to_review
- https://github.com/WinMin/CVE-2021-3560
- https://github.com/aancw/polkit-auto-exploit
- https://github.com/aasphixie/aasphixie.github.io
- https://github.com/anquanscan/sec-tools
- https://github.com/asepsaepdin/CVE-2021-1732
- https://github.com/asepsaepdin/CVE-2021-3560
- https://github.com/asepsaepdin/CVE-2021-4034
- https://github.com/asepsaepdin/CVE-2023-22809
- https://github.com/axelmierczuk/privesc
- https://github.com/binganao/vulns-2022
- https://github.com/chenaotian/CVE-2021-3560
- https://github.com/chorankates/Blunder
- https://github.com/chorankates/Photobomb
- https://github.com/chorankates/RedPanda
- https://github.com/cpu0x00/CVE-2021-3560
- https://github.com/curtishoughton/CVE-2021-3560
- https://github.com/e-hakson/OSCP
- https://github.com/edsonjt81/Linux-Privilege-Escalation
- https://github.com/eljosep/OSCP-Guide
- https://github.com/elouatih/securite_devoirs
- https://github.com/exfilt/CheatSheet
- https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus
- https://github.com/hakivvi/CVE-2021-3560
- https://github.com/hktalent/bug-bounty
- https://github.com/huike007/penetration_poc
- https://github.com/iSTAR-Lab/CVE-2021-3560_PoC
- https://github.com/iSTARLabs/CVE-2021-3560_PoC
- https://github.com/innxrmxst/CVE-2021-3560
- https://github.com/jenriquezv/OSCP-Cheat-Sheets
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/khulnasoft-lab/awesome-security
- https://github.com/khulnasoft-labs/awesome-security
- https://github.com/liamg/traitor
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/manas3c/CVE-POC
- https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation
- https://github.com/merlinepedra/TRAITOR
- https://github.com/merlinepedra25/TRAITOR
- https://github.com/mikefak/XDR-PoC
- https://github.com/mr-nobody20/CVE-2021-3560
- https://github.com/n3onhacks/CVE-2021-3560
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onlypwns/htb-writeup
- https://github.com/oscpname/OSCP_cheat
- https://github.com/oxagast/oxasploits
- https://github.com/parth45/cheatsheet
- https://github.com/pashayogi/ROOT-CVE-2021-3560
- https://github.com/puckiestyle/CVE-2021-4034
- https://github.com/revanmalang/OSCP
- https://github.com/rexpository/linux-privilege-escalation
- https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation
- https://github.com/smile-e3/vehicle-kernel-exploit
- https://github.com/soosmile/POC
- https://github.com/stormshadow-ops/Local-Privileges-Escalation
- https://github.com/swapravo/polkadots
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/thesakibrahman/THM-Free-Room
- https://github.com/thr10en4/htb-writeup
- https://github.com/trhacknon/Pocingit
- https://github.com/tufanturhan/Polkit-Linux-Priv
- https://github.com/txuswashere/OSCP
- https://github.com/tyyu3/mitre_example
- https://github.com/valescaalvesc/HTB-PAPER-CTF
- https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation-
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve