Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-13272

Description

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

POC

Reference

- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html

- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html

- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html

- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html

- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html

- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17

- https://usn.ubuntu.com/4117-1/

- https://usn.ubuntu.com/4118-1/

Github

- https://github.com/0xMrNiko/Awesome-Red-Teaming

- https://github.com/0xT11/CVE-POC

- https://github.com/20142995/sectool

- https://github.com/2lambda123/CVE-mitre

- https://github.com/5l1v3r1/CVE-2019-13276

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/LinuxEelvation

- https://github.com/Amar224/Pentest-Tools

- https://github.com/AnonVulc/Pentest-Tools

- https://github.com/Blacloud226/sao

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Chinmay1743/ptrace-vuln

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Cyc1eC/CVE-2019-13272

- https://github.com/De4dCr0w/Linux-kernel-EoP-exp

- https://github.com/DrewSC13/Linpeas

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/Getshell/LinuxTQ

- https://github.com/GgKendall/secureCodingDemo

- https://github.com/GhostTroops/TOP

- https://github.com/H0j3n/EzpzCheatSheet

- https://github.com/H1CH444MREB0RN/PenTest-free-tools

- https://github.com/HaleyWei/POC-available

- https://github.com/HaxorSecInfec/autoroot.sh

- https://github.com/Huandtx/CVE-2019-13272

- https://github.com/ImranTheThirdEye/AD-Pentesting-Tools

- https://github.com/JERRY123S/all-poc

- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

- https://github.com/MDS1GNAL/ptrace_scope-CVE-2019-13272-privilege-escalation

- https://github.com/Maikefee/linux-exploit-hunter

- https://github.com/Mehedi-Babu/pentest_tools_repo

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/MrPWH/Pentest-Tools

- https://github.com/ONQLin/OS-CourseDesign

- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PsychoH4x0r/Unknown1337-Auto-Root-

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/RashmikaEkanayake/Privilege-Escalation-CVE-2019-13272-

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/S3cur3Th1sSh1t/Pentest-Tools

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Snoopy-Sec/Localroot-ALL-CVE

- https://github.com/Tharana/Exploiting-a-Linux-kernel-vulnerability

- https://github.com/Tharana/vulnerability-exploitation

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/Waseem27-art/ART-TOOLKIT

- https://github.com/Whiteh4tWolf/xcoderootsploit

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/YellowVeN0m/Pentesters-toolbox

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/ZTK-009/RedTeamer

- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/anoaghost/Localroot_Compile

- https://github.com/asepsaepdin/CVE-2019-13272

- https://github.com/babyshen/CVE-2019-13272

- https://github.com/bcoles/kernel-exploits

- https://github.com/bigbigliang-malwarebenchmark/cve-2019-13272

- https://github.com/cedelasen/htb-laboratory

- https://github.com/chorankates/Irked

- https://github.com/christian-byrne/custom-nodes-security-scan

- https://github.com/christian-byrne/node-sec-scan

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/datntsec/CVE-2019-13272

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/elinakrmova/RedTeam-Tools

- https://github.com/emtee40/win-pentest-tools

- https://github.com/fei9747/LinuxEelvation

- https://github.com/fengjixuchui/RedTeamer

- https://github.com/gglessner/Rocky

- https://github.com/go-bi/go-bi-soft

- https://github.com/hack-parthsharma/Pentest-Tools

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/icecliffs/Linux-For-Root

- https://github.com/jana30116/CVE-2019-13272-Local-Privilege-Escalation

- https://github.com/jared1981/More-Pentest-Tools

- https://github.com/jas502n/CVE-2019-13272

- https://github.com/jbmihoub/all-poc

- https://github.com/jiayy/android_vuln_poc-exp

- https://github.com/jitmondal1/Researcher

- https://github.com/josemlwdf/CVE-2019-13272

- https://github.com/karlhat/Ksplice-demo

- https://github.com/kdandy/pentest_tools

- https://github.com/kurniawandata/xcoderootsploit

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lnick2023/nicenice

- https://github.com/merlinepedra/Pentest-Tools

- https://github.com/merlinepedra25/Pentest-Tools

- https://github.com/merlinepedra25/Pentest-Tools-1

- https://github.com/n3t1nv4d3/kernel-exploits

- https://github.com/nisadevi11/Localroot-ALL-CVE

- https://github.com/nitishbadole/Pentest_Tools

- https://github.com/nu11secur1ty/CVE-mitre

- https://github.com/nyk4989/search_gtfobins

- https://github.com/oneoy/CVE-2019-13272

- https://github.com/password520/Penetration_PoC

- https://github.com/password520/RedTeamer

- https://github.com/pathakabhi24/Pentest-Tools

- https://github.com/pentration/gongkaishouji

- https://github.com/pjgmonteiro/Pentest-tools

- https://github.com/polosec/CVE-2019-13272

- https://github.com/pwnCmndr/LinuxPrivEsc

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/rakjong/LinuxElevation

- https://github.com/retr0-13/Pentest-Tools

- https://github.com/severnake/Pentest-Tools

- https://github.com/sumedhaDharmasena/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272

- https://github.com/swignore/linpeas

- https://github.com/talent-x90c/cve_list

- https://github.com/teddy47/CVE-2019-13272---Documentation

- https://github.com/theyoge/AD-Pentesting-Tools

- https://github.com/vlain1337/auto-lpe

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/x90hack/vulnerabilty_lab

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji