# CVE-2021-3156 **Repository Path**: pwn2security/CVE-2021-3156 ## Basic Information - **Project Name**: CVE-2021-3156 - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-02-01 - **Last Updated**: 2021-02-01 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # CVE-2021-3156 PoC ## Introduction This is an exploit for the `CVE-2021-3156` sudo vulnerability (dubbed [Baron Samedit](https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt) by Qualys). ## Usage build: ``` $ make ``` list targets: ``` $ ./sudo-hax-me-a-sandwich ``` run: ``` $ ./sudo-hax-me-a-sandwich ``` manual mode: ``` $ ./sudo-hax-me-a-sandwich ``` ## Bruteforce target finding (experimental) Make sure you have [GNU parallel](https://ftpmirror.gnu.org/parallel/parallel-latest.tar.bz2) installed. ``` $ make brute $ ./brute.sh ``` some defaults to try: ``` $ ./brute.sh 90 120 50 70 150 300 ``` Will eat up all available cores. Don't try to netflix & brute. ## Contributing Send (sensible) PR's, I might merge. Some ideas: * More targets * Target finding * Other exploitation strategies * More self contained functionality: * Embed shared library hax.c (Make it small please, ELF golf + asm setuid/execve stub) * Add mkdir logic to hax.c * Directory/shared library cleanup