ptrace Sudo Token Privilege Escalation...

- AV AC AU C I A
发布: 2019-09-02
修订: 2019-09-03

This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64).

0%
当前有1条漏洞利用/PoC
产品及版本信息(CPE)暂不可用