Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-7304

Description

Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.

POC

Reference

- https://www.exploit-db.com/exploits/46361

- https://www.exploit-db.com/exploits/46362

Github

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xT11/CVE-POC

- https://github.com/0xZipp0/OSCP

- https://github.com/0xsyr0/OSCP

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/LinuxEelvation

- https://github.com/BGrewell/SockPuppet

- https://github.com/Blacloud226/sao

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Dhayalanb/Snapd-V2

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/GhostTroops/TOP

- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

- https://github.com/Ly0nt4r/OSCP

- https://github.com/Mr-Tree-S/POC_EXP

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SecuritySi/CVE-2019-7304_DirtySock

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SirElmard/ethical_hacking

- https://github.com/Snoopy-Sec/Localroot-ALL-CVE

- https://github.com/VieVaWaldi/DirtySock

- https://github.com/VishuGahlyan/OSCP

- https://github.com/WalterEhren/DirtySock

- https://github.com/WalterEren/DirtySock

- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits

- https://github.com/anoaghost/Localroot_Compile

- https://github.com/bgrewell/SockPuppet

- https://github.com/blkdevcon/awesome-starz

- https://github.com/chorankates/OpenAdmin

- https://github.com/coby-nguyen/Document-Linux-Privilege-Escalation

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/e-hakson/OSCP

- https://github.com/eljosep/OSCP-Guide

- https://github.com/elvi7major/snap_priv_esc

- https://github.com/exfilt/CheatSheet

- https://github.com/f4T1H21/HackTheBox-Writeups

- https://github.com/f4T1H21/dirty_sock

- https://github.com/fazilbaig1/oscp

- https://github.com/fei9747/LinuxEelvation

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/initstring/dirty_sock

- https://github.com/jitmondal1/OSCP

- https://github.com/jitmondal1/Researcher

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/lacework/up-and-running-packer

- https://github.com/n0-traces/cve_monitor

- https://github.com/nisadevi11/Localroot-ALL-CVE

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nyk4989/search_gtfobins

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/rakjong/LinuxElevation

- https://github.com/revanmalang/OSCP

- https://github.com/scottford-lw/up-and-running-packer

- https://github.com/siddicky/yotjf

- https://github.com/swignore/linpeas

- https://github.com/txuswashere/OSCP

- https://github.com/xcode96/REDME

- https://github.com/xhref/OSCP