We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tested on a vanilla VM and a configured image, both running Redhat 7. Authentication fails for both, so the exploit does not work.
Note: Any claims that CrowdStrike allows this exploit are 100% false.
The text was updated successfully, but these errors were encountered:
Can you send the output of uname -a and head -n1 /etc/passwd after running the exploit please?
uname -a
head -n1 /etc/passwd
Sorry, something went wrong.
I'm thinking that because RHEL 7 still runs a v3 Kernel is why this is not working.
$ ./exploit
Backing up /etc/passwd to /tmp/passwd.bak ... Setting root password to "aaron"... Password: su: Authentication failure
$ uname -a Linux 3.10.0-1160.53.1.el7.x86_64 #1 SMP Thu Dec 16 10:19:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Linux 3.10.0-1160.53.1.el7.x86_64 #1 SMP Thu Dec 16 10:19:28 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
$ head -n1 /etc/passwd root:x:0:0:root:/root:/bin/bash
root:x:0:0:root:/root:/bin/bash
Yes, your kernel version is not vulnerable. The vulnerability affects kernel releases from 5.8 onwards.
No branches or pull requests
Tested on a vanilla VM and a configured image, both running Redhat 7.
Authentication fails for both, so the exploit does not work.
Note: Any claims that CrowdStrike allows this exploit are 100% false.
The text was updated successfully, but these errors were encountered: