POC详情: 69c2eaa6db72f2d3e4f62e8e70ee59322c78f98f

来源
关联漏洞
标题: cpio 输入验证错误漏洞 (CVE-2021-38185)
描述:cpio是一款用于类UNIX系统的文件备份程序。 cpio 中存在安全漏洞。允许攻击者通过精心设计的模式文件执行任意代码,因为 dstring.c ds_fgetstr 整数溢出会触发越界堆写入。
描述
ACE poc exploit for glibc cpio 2.13 through mmap chunk metadata curruption (CVE-2021-38185)
介绍
# cpiopwn (CVE-2021-38185)
This is an ACE POC of an integer overflow bug in cpio. This exploit bypasses all binary protections except full RELRO. This exploit uses cpio 2.13 and libc 2.31. Video demo: https://youtu.be/F0yKJhu7Vak 

## Running the exploit

We've provided a Kali Dockerfile to run the exploit. The same exploit should work outside the Docker container, but offsets may be different.

### Instructions
* Build the file
  * `sudo docker build -t cpiopwn .`
* Start the image and mount files
  * `sudo docker run --mount type=bind,source=$(pwd),destination=/cpiopwn -it cpiopwn /bin/bash`
* `cd cpiopwn`
* Run the exploit, which will build a pattern file with `docker_fengshui.py` and call cpio with a large number of command line arguments.
  * `python3 exploit.py`

And that's it! After building the malicious pattern file, a prompt will show up, and it will start processing commands after a little bit of time.

### Notes
The exploit may take about a minute after the prompt appears before it starts responding to commands. We've provided a video of it running to show what should happen.

Additionally, the exploit may only work on computers with at least 12 GB of RAM, as it forces cpio to read gigabytes of input. We had some issues with servers running out of RAM with previous versions of the exploit - the current version has been tested on computers with 12 and 16 GB of RAM, but not smaller.

```
    |\__/,|   (`\
  _.|o o  |_   ) )
-(((---(((--------
```
文件快照

[4.0K] /data/pocs/69c2eaa6db72f2d3e4f62e8e70ee59322c78f98f ├── [2.6K] docker_fengshui.py ├── [ 608] Dockerfile ├── [148K] dynsym-hacked.bin ├── [ 338] exploit.py └── [1.4K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。