mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 10:10:35 +00:00
354 lines
17 KiB
Markdown
354 lines
17 KiB
Markdown
### [CVE-2022-0847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html
|
|
- http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html
|
|
- http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html
|
|
- http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html
|
|
- https://dirtypipe.cm4all.com/
|
|
|
|
#### Github
|
|
- https://github.com/0day404/vulnerability-poc
|
|
- https://github.com/0xIronGoat/dirty-pipe
|
|
- https://github.com/0xMarcio/cve
|
|
- https://github.com/0xStrygwyr/OSCP-Guide
|
|
- https://github.com/0xTen/pwn-gym
|
|
- https://github.com/0xZipp0/OSCP
|
|
- https://github.com/0xeremus/dirty-pipe-poc
|
|
- https://github.com/0xr1l3s/CVE-2022-0847
|
|
- https://github.com/0xsmirk/vehicle-kernel-exploit
|
|
- https://github.com/0xsyr0/OSCP
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/2xYuan/CVE-2022-0847
|
|
- https://github.com/4O4errorrr/TP_be_root
|
|
- https://github.com/4bhishek0/CVE-2022-0847-Poc
|
|
- https://github.com/4luc4rdr5290/CVE-2022-0847
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Abhi-1712/ejpt-roadmap
|
|
- https://github.com/Al1ex/CVE-2022-0847
|
|
- https://github.com/Al1ex/LinuxEelvation
|
|
- https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/AnastasiaLomova/PR1
|
|
- https://github.com/AnastasiaLomova/PR1.1
|
|
- https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit
|
|
- https://github.com/ArrestX/--POC
|
|
- https://github.com/Asbatel/CBDS_CVE-2022-0847_POC
|
|
- https://github.com/Awrrays/Pentest-Tips
|
|
- https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit
|
|
- https://github.com/BlessedRebuS/OSCP-Pentesting-Cheatsheet
|
|
- https://github.com/BlizzardEternity/CVE-2022-0847
|
|
- https://github.com/BlizzardEternity/DirtyPipe-Android
|
|
- https://github.com/BlizzardEternity/dirtypipez-exploit
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/CYB3RK1D/CVE-2022-0847-POC
|
|
- https://github.com/CYBER-PUBLIC-SCHOOL/linux-privilege-escalation-cheatsheet
|
|
- https://github.com/Ch4nc3n/PublicExploitation
|
|
- https://github.com/CharonDefalt/linux-exploit
|
|
- https://github.com/DanaEpp/pwncat_dirtypipe
|
|
- https://github.com/DanielShmu/OSCP-Cheat-Sheet
|
|
- https://github.com/DataDog/dirtypipe-container-breakout-poc
|
|
- https://github.com/DataFox/CVE-2022-0847
|
|
- https://github.com/DevataDev/PiracyTools
|
|
- https://github.com/Disturbante/Linux-Pentest
|
|
- https://github.com/DylanBarbe/dirty-pipe-clone-4-root
|
|
- https://github.com/DylanBarbe/hj
|
|
- https://github.com/EGI-Federation/SVG-advisories
|
|
- https://github.com/EagleTube/CVE-2022-0847
|
|
- https://github.com/FeFi7/attacking_embedded_linux
|
|
- https://github.com/FedericoGaribay/Tarea-exploit
|
|
- https://github.com/Getshell/LinuxTQ
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/GibzB/THM-Captured-Rooms
|
|
- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe
|
|
- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe-
|
|
- https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits
|
|
- https://github.com/Ha0-Y/LinuxKernelExploits
|
|
- https://github.com/Ha0-Y/kernel-exploit-cve
|
|
- https://github.com/HadessCS/Awesome-Privilege-Escalation
|
|
- https://github.com/HaxorSecInfec/autoroot.sh
|
|
- https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher
|
|
- https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit
|
|
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
|
|
- https://github.com/Ignitetechnologies/Linux-Privilege-Escalation
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
|
- https://github.com/JlSakuya/CVE-2022-0847-container-escape
|
|
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
|
- https://github.com/KayCHENvip/vulnerability-poc
|
|
- https://github.com/Kiosec/Linux-Exploitation
|
|
- https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits
|
|
- https://github.com/LudovicPatho/CVE-2022-0847
|
|
- https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe
|
|
- https://github.com/Ly0nt4r/OSCP
|
|
- https://github.com/MCANMCAN/TheDirtyPipeExploit
|
|
- https://github.com/ManciSee/M6__Insecure_Authorization
|
|
- https://github.com/Meowmycks/OSCPprep-Cute
|
|
- https://github.com/Meowmycks/OSCPprep-Sar
|
|
- https://github.com/Meowmycks/OSCPprep-hackme1
|
|
- https://github.com/Metarget/metarget
|
|
- https://github.com/Miraitowa70/POC-Notes
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker
|
|
- https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/Nekoox/dirty-pipe
|
|
- https://github.com/NetKingJ/awesome-android-security
|
|
- https://github.com/NxPnch/Linux-Privesc
|
|
- https://github.com/OlegBr04/Traitor
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/Patocoh/Research-Dirty-Pipe
|
|
- https://github.com/PenTestical/linpwn
|
|
- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker
|
|
- https://github.com/Qwertozavr/PR1_3
|
|
- https://github.com/Qwertozavr/PR1_3.2
|
|
- https://github.com/Qwertozavr/PR1_TRPP
|
|
- https://github.com/RACHO-PRG/Linux_Escalada_Privilegios
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/Shadowven/Vulnerability_Reproduction
|
|
- https://github.com/Shotokhan/cve_2022_0847_shellcode
|
|
- https://github.com/SirElmard/ethical_hacking
|
|
- https://github.com/SnailDev/github-hot-hub
|
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
|
- https://github.com/T4t4ru/CVE-2022-0847
|
|
- https://github.com/Tanq16/link-hub
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/Trickhish/automated_privilege_escalation
|
|
- https://github.com/Turzum/ps-lab-cve-2022-0847
|
|
- https://github.com/Udyz/CVE-2022-0847
|
|
- https://github.com/UgoDasseleer/write-up-Intermediate-Nmap
|
|
- https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit
|
|
- https://github.com/VISHALSB85/ejpt-roadmap
|
|
- https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/XiaozaYa/CVE-Recording
|
|
- https://github.com/XmasSnowISBACK/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/ZWDeJun/ZWDeJun
|
|
- https://github.com/Zen-ctrl/Rutgers_Cyber_Range
|
|
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
|
|
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
|
|
- https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground
|
|
- https://github.com/ahrixia/CVE_2022_0847
|
|
- https://github.com/airbus-cert/dirtypipe-ebpf_detection
|
|
- https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs
|
|
- https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe
|
|
- https://github.com/antx-code/CVE-2022-0847
|
|
- https://github.com/arttnba3/CVE-2022-0847
|
|
- https://github.com/aruncs31s/Ethical-h4ckers.github.io
|
|
- https://github.com/aruncs31s/ethical-hacking
|
|
- https://github.com/atksh/Dirty-Pipe-sudo-poc
|
|
- https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/ayushx007/CVE-2022-0847-dirty-pipe-checker
|
|
- https://github.com/b4dboy17/Dirty-Pipe-Oneshot
|
|
- https://github.com/babyshen/CVE-2022-0847
|
|
- https://github.com/badboy-sft/Dirty-Pipe-Oneshot
|
|
- https://github.com/badboycxcc/script
|
|
- https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker
|
|
- https://github.com/bbaranoff/CVE-2022-0847
|
|
- https://github.com/beruangsalju/LocalPrivelegeEscalation
|
|
- https://github.com/beruangsalju/LocalPrivilegeEscalation
|
|
- https://github.com/binganao/vulns-2022
|
|
- https://github.com/bohr777/cve-2022-0847dirtypipe-exploit
|
|
- https://github.com/boy-hack/zsxq
|
|
- https://github.com/brant-ruan/poc-demo
|
|
- https://github.com/breachnix/dirty-pipe-poc
|
|
- https://github.com/bsauce/kernel-exploit-factory
|
|
- https://github.com/bsauce/kernel-security-learning
|
|
- https://github.com/c0ntempt/CVE-2022-0847
|
|
- https://github.com/carlcedin/moe-demo
|
|
- https://github.com/carlosevieira/Dirty-Pipe
|
|
- https://github.com/chenaotian/CVE-2022-0185
|
|
- https://github.com/chenaotian/CVE-2022-0847
|
|
- https://github.com/cont3mpt/CVE-2022-0847
|
|
- https://github.com/cookiengineer/groot
|
|
- https://github.com/crac-learning/CVE-analysis-reports
|
|
- https://github.com/crowsec-edtech/Dirty-Pipe
|
|
- https://github.com/crusoe112/DirtyPipePython
|
|
- https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/d-rn/vulBox
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
|
- https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit
|
|
- https://github.com/decrypthing/CVE_2022_0847
|
|
- https://github.com/drapl0n/dirtypipe
|
|
- https://github.com/e-hakson/OSCP
|
|
- https://github.com/edr1412/Dirty-Pipe
|
|
- https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe-
|
|
- https://github.com/edsonjt81/CVE-2022-0847-Linux
|
|
- https://github.com/edsonjt81/Linux-Privilege-Escalation
|
|
- https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/eljosep/OSCP-Guide
|
|
- https://github.com/emmaneugene/CS443-project
|
|
- https://github.com/eremus-dev/Dirty-Pipe-sudo-poc
|
|
- https://github.com/eric-glb/dirtypipe
|
|
- https://github.com/febinrev/dirtypipez-exploit
|
|
- https://github.com/felixfu59/kernel-hack
|
|
- https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/giterlizzi/secdb-feeds
|
|
- https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847
|
|
- https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape
|
|
- https://github.com/gyaansastra/CVE-2022-0847
|
|
- https://github.com/h0pe-ay/Vulnerability-Reproduction
|
|
- https://github.com/h4ckm310n/CVE-2022-0847-eBPF
|
|
- https://github.com/h4ckm310n/Container-Vulnerability-Exploit
|
|
- https://github.com/hegusung/netscan
|
|
- https://github.com/hheeyywweellccoommee/CVE-2022-0847-gfobj
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/hoanbi1812000/hoanbi1812000
|
|
- https://github.com/hugefiver/mystars
|
|
- https://github.com/hugs42/infosec
|
|
- https://github.com/hxlxmjxbbxs/TheDirtyPipeExploit
|
|
- https://github.com/iandrade87br/OSCP
|
|
- https://github.com/icontempt/CVE-2022-0847
|
|
- https://github.com/ih3na/debian11-dirty_pipe-patcher
|
|
- https://github.com/imfiver/CVE-2022-0847
|
|
- https://github.com/iohubos/iohubos
|
|
- https://github.com/iridium-soda/container-escape-exploits
|
|
- https://github.com/irwx777/CVE-2022-0847
|
|
- https://github.com/isaiahsimeone/COMP3320-VAPT
|
|
- https://github.com/jamesbrunet/dirtypipe-writeup
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation
|
|
- https://github.com/jonathanbest7/cve-2022-0847
|
|
- https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout
|
|
- https://github.com/jxpsx/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/k0mi-tg/CVE-POC
|
|
- https://github.com/kaosagnt/ansible-everyday
|
|
- https://github.com/karanlvm/DirtyPipe-Exploit
|
|
- https://github.com/karimhabush/cyberowl
|
|
- https://github.com/kdn111/linux-kernel-exploitation
|
|
- https://github.com/kgwanjala/oscp-cheatsheet
|
|
- https://github.com/khanhdn111/linux-kernel-exploitation
|
|
- https://github.com/khanhdz-06/linux-kernel-exploitation
|
|
- https://github.com/khanhdz191/linux-kernel-exploitation
|
|
- https://github.com/khanhhdz/linux-kernel-exploitation
|
|
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
|
- https://github.com/khanhnd123/linux-kernel-exploitation
|
|
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
|
|
- https://github.com/knd06/linux-kernel-exploitation
|
|
- https://github.com/knqyf263/CVE-2022-0847
|
|
- https://github.com/kun-g/Scraping-Github-trending
|
|
- https://github.com/kwxk/Rutgers_Cyber_Range
|
|
- https://github.com/leoambrus/CheckersNomisec
|
|
- https://github.com/letsr00t/CVE-2022-0847
|
|
- https://github.com/lewiswu1209/sif
|
|
- https://github.com/liamg/liamg
|
|
- https://github.com/liamg/traitor
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/logit507/logit507
|
|
- https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits
|
|
- https://github.com/lonnyzhang423/github-hot-hub
|
|
- https://github.com/lucksec/CVE-2022-0847
|
|
- https://github.com/makoto56/penetration-suite-toolkit
|
|
- https://github.com/manas3c/CVE-POC
|
|
- https://github.com/marksowell/my-stars
|
|
- https://github.com/marksowell/starred
|
|
- https://github.com/marksowell/stars
|
|
- https://github.com/merlinepedra/TRAITOR
|
|
- https://github.com/merlinepedra25/TRAITOR
|
|
- https://github.com/mhanief/dirtypipe
|
|
- https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe
|
|
- https://github.com/mrchucu1/CVE-2022-0847-Docker
|
|
- https://github.com/murchie85/twitterCyberMonitor
|
|
- https://github.com/mutur4/CVE-2022-0847
|
|
- https://github.com/n3rada/DirtyPipe
|
|
- https://github.com/nanaao/Dirtypipe-exploit
|
|
- https://github.com/nanaao/dirtyPipe-automaticRoot
|
|
- https://github.com/ndk191/linux-kernel-exploitation
|
|
- https://github.com/nidhi7598/linux-4.19.72_lib_CVE-2022-0847
|
|
- https://github.com/nitishbadole/oscp-note-3
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/notl0cal/dpipe
|
|
- https://github.com/notmariekondo/notmariekondo
|
|
- https://github.com/nu1l-ptr/CVE-2022-0847-Poc
|
|
- https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/oscpname/OSCP_cheat
|
|
- https://github.com/parkjunmin/CTI-Search-Criminalip-Search-Tool
|
|
- https://github.com/pashayogi/DirtyPipe
|
|
- https://github.com/pen4uin/awesome-cloud-native-security
|
|
- https://github.com/pen4uin/cloud-native-security
|
|
- https://github.com/pentestblogin/pentestblog-CVE-2022-0847
|
|
- https://github.com/peterspbr/dirty-pipe-otw
|
|
- https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits
|
|
- https://github.com/pipiscrew/timeline
|
|
- https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847
|
|
- https://github.com/polygraphene/DirtyPipe-Android
|
|
- https://github.com/promise2k/OSCP
|
|
- https://github.com/puckiestyle/CVE-2022-0847
|
|
- https://github.com/qqdagustian/CVE_2022_0847
|
|
- https://github.com/qwert419/linux-
|
|
- https://github.com/r1is/CVE-2022-0847
|
|
- https://github.com/rahul1406/cve-2022-0847dirtypipe-exploit
|
|
- https://github.com/raohemanth/cybersec-dirty-pipe-vulnerability
|
|
- https://github.com/realbatuhan/dirtypipetester
|
|
- https://github.com/revanmalang/OSCP
|
|
- https://github.com/rexpository/linux-privilege-escalation
|
|
- https://github.com/s3mPr1linux/CVE_2022_0847
|
|
- https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847
|
|
- https://github.com/sarutobi12/sarutobi12
|
|
- https://github.com/scopion/dirty-pipe
|
|
- https://github.com/si1ent-le/CVE-2022-0847
|
|
- https://github.com/siberiah0h/CVE-CNVD-HUB
|
|
- https://github.com/siegfrkn/CSCI5403_CVE20220847_Detection
|
|
- https://github.com/smile-e3/vehicle-kernel-exploit
|
|
- https://github.com/solomon12354/CVE-2022-0847-Dirty_Pipe_virus
|
|
- https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus
|
|
- https://github.com/soosmile/POC
|
|
- https://github.com/source-xu/docker-vuls
|
|
- https://github.com/ssr-111/linux-kernel-exploitation
|
|
- https://github.com/stefanoleggio/dirty-pipe-cola
|
|
- https://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847
|
|
- https://github.com/taielab/awesome-hacking-lists
|
|
- https://github.com/talent-x90c/cve_list
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/teamssix/container-escape-check
|
|
- https://github.com/terabitSec/dirtyPipe-automaticRoot
|
|
- https://github.com/theo-goetzinger/TP_be_root
|
|
- https://github.com/thesakibrahman/THM-Free-Room
|
|
- https://github.com/tiann/DirtyPipeRoot
|
|
- https://github.com/tmoneypenny/CVE-2022-0847
|
|
- https://github.com/tnishiox/kernelcare-playground
|
|
- https://github.com/trhacknon/CVE-2022-0847-DirtyPipe-Exploit
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/trhacknon/dirtypipez-exploit
|
|
- https://github.com/tstromberg/ioc-bench
|
|
- https://github.com/tstromberg/ttp-bench
|
|
- https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc
|
|
- https://github.com/txuswashere/OSCP
|
|
- https://github.com/uhub/awesome-c
|
|
- https://github.com/ukmihiran/Rubber_Ducky_Payloads
|
|
- https://github.com/veritas501/pipe-primitive
|
|
- https://github.com/versatilexec/CVE_2022_0847
|
|
- https://github.com/vknc/vknc.github.io
|
|
- https://github.com/wechicken456/Linux-kernel
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation-
|
|
- https://github.com/whoforget/CVE-POC
|
|
- https://github.com/wkhnh06/linux-kernel-exploitation
|
|
- https://github.com/wpressly/exploitations
|
|
- https://github.com/x90hack/vulnerabilty_lab
|
|
- https://github.com/xairy/linux-kernel-exploitation
|
|
- https://github.com/xhref/OSCP
|
|
- https://github.com/xnderLAN/CVE-2022-0847
|
|
- https://github.com/xndpxs/CVE-2022-0847
|
|
- https://github.com/xsudoxx/OSCP
|
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
|
- https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape
|
|
- https://github.com/youwizard/CVE-POC
|
|
- https://github.com/z3dc0ps/awesome-linux-exploits
|
|
- https://github.com/zecool/cve
|
|
- https://github.com/zzcentury/PublicExploitation
|
|
|