Skip to content

an exploit for CVE-2024-48990 ( Local Privilege Escalation ) in needrestart

License

Notifications You must be signed in to change notification settings

o-sec/CVE-2024-48990

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-48990 POC

Overview

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

This repository contains a proof-of-concept (PoC) exploit for CVE-2024-48990.

Vulnerability Summary

  • CVE ID: CVE-2024-48990
  • Affected Component: needrestart
  • Vulnerability Type: Local Privilege Escalation
  • Attack Vector: Local
  • Impact: Privilege escalation to root

Usage

./poc.sh 

"loop.py" and "privesc.py" is just a sample for the exploitation, you dont need to bring them with the poc.sh !. all you need is the poc.sh

Disclaimer

This project is intended for educational and research purposes only. The author is not responsible for any misuse of this code or for any damage resulting from its use.

About

an exploit for CVE-2024-48990 ( Local Privilege Escalation ) in needrestart

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published