cve/2023/CVE-2023-0386.md
2024-06-18 02:51:15 +02:00

65 lines
3.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2023-0386](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386)
![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-282&color=brighgreen)
### Description
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernels OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
### POC
#### Reference
- http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
#### Github
- https://github.com/0xMarcio/cve
- https://github.com/20142995/sectool
- https://github.com/3yujw7njai/CVE-2023-0386
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/Anekant-Singhai/Exploits
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/CKevens/CVE-2023-0386
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/DataDog/security-labs-pocs
- https://github.com/Disturbante/Linux-Pentest
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/EstamelGG/CVE-2023-0386-libs
- https://github.com/Fanxiaoyao66/CVE-2023-0386
- https://github.com/Fanxiaoyao66/Hack-The-Box-TwoMillion
- https://github.com/GhostTroops/TOP
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Threekiii/CVE
- https://github.com/abylinjohnson/linux-kernel-exploits
- https://github.com/beruangsalju/LocalPrivilegeEscalation
- https://github.com/chenaotian/CVE-2023-0386
- https://github.com/churamanib/CVE-2023-0386
- https://github.com/djytmdj/Tool_Summary
- https://github.com/hktalent/TOP
- https://github.com/hshivhare67/kernel_v4.19.72_CVE-2023-0386
- https://github.com/hungslab/awd-tools
- https://github.com/izj007/wechat
- https://github.com/johe123qwe/github-trending
- https://github.com/letsr00t/CVE-2023-0386
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/puckiestyle/CVE-2023-0386
- https://github.com/shungo0222/shungo0222
- https://github.com/silentEAG/awesome-stars
- https://github.com/sxlmnwb/CVE-2023-0386
- https://github.com/talent-x90c/cve_list
- https://github.com/toastydz/toastydz.github.io
- https://github.com/toastytoastytoasty/toastydz.github.io
- https://github.com/tycloud97/awesome-stars
- https://github.com/veritas501/CVE-2023-0386
- https://github.com/whoami13apt/files2
- https://github.com/x3t2con/Rttools-2
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xkaneiki/CVE-2023-0386