Skip to content

Commit b00b808

Browse files
committed
automatic module_metadata_base.json update
1 parent dbc020a commit b00b808

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86832,6 +86832,67 @@
8683286832

8683386833
]
8683486834
},
86835+
"exploit_linux/local/cve_2023_0386_overlayfs_priv_esc": {
86836+
"name": "Local Privilege Escalation via CVE-2023-0386",
86837+
"fullname": "exploit/linux/local/cve_2023_0386_overlayfs_priv_esc",
86838+
"aliases": [
86839+
86840+
],
86841+
"rank": 600,
86842+
"disclosure_date": "2023-03-22",
86843+
"type": "exploit",
86844+
"author": [
86845+
"xkaneiki",
86846+
"sxlmnwb",
86847+
"Takahiro Yokoyama"
86848+
],
86849+
"description": "This exploit targets the Linux kernel bug in OverlayFS.\n\n A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities\n was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount.\n This uid mapping bug allows a local user to escalate their privileges on the system.",
86850+
"references": [
86851+
"CVE-2023-0386",
86852+
"URL-https://github.com/sxlmnwb/CVE-2023-0386",
86853+
"URL-https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/overlayfs-cve-2023-0386",
86854+
"URL-https://securitylabs.datadoghq.com/articles/overlayfs-cve-2023-0386/",
86855+
"URL-https://www.vicarius.io/vsociety/posts/cve-2023-0386-a-linux-kernel-bug-in-overlayfs"
86856+
],
86857+
"platform": "Linux",
86858+
"arch": "x64",
86859+
"rport": null,
86860+
"autofilter_ports": [
86861+
86862+
],
86863+
"autofilter_services": [
86864+
86865+
],
86866+
"targets": [
86867+
"Automatic"
86868+
],
86869+
"mod_time": "2024-09-24 08:18:30 +0000",
86870+
"path": "/modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb",
86871+
"is_install_path": true,
86872+
"ref_name": "linux/local/cve_2023_0386_overlayfs_priv_esc",
86873+
"check": true,
86874+
"post_auth": false,
86875+
"default_credential": false,
86876+
"notes": {
86877+
"Reliability": [
86878+
"repeatable-session"
86879+
],
86880+
"Stability": [
86881+
"crash-safe"
86882+
],
86883+
"SideEffects": [
86884+
"artifacts-on-disk"
86885+
]
86886+
},
86887+
"session_types": [
86888+
"shell",
86889+
"meterpreter"
86890+
],
86891+
"needs_cleanup": true,
86892+
"actions": [
86893+
86894+
]
86895+
},
8683586896
"exploit_linux/local/desktop_privilege_escalation": {
8683686897
"name": "Desktop Linux Password Stealer and Privilege Escalation",
8683786898
"fullname": "exploit/linux/local/desktop_privilege_escalation",

0 commit comments

Comments
 (0)