Jan. 28, 2022, 4:15 p.m. | Yaku

DEV Community dev.to




CVE-2021-4034

While the vulnerability is not exploitable remotely and doesn’t, in itself, allow arbitrary code execution, it can be used by attackers that have already gained a foothold on a vulnerable host to escalate their privileges and achieve that capability.


https://seclists.org/oss-sec/2022/q1/80https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034





PoC

Verified on Debian 10 and CentOS 7.


You can find the repo at this link here → https://github.com/Yakumwamba/POC-CVE-2021-4034.git



yaku@debian:~$ grep PRETTY /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
yaku@debian:~$ id
uid=1000(user) gid=1000(yaku) groups=1000(user),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev)
yaku@debian:~$ gcc cve-2021-4034-poc.c -o cve-2021-4034-poc
yaku@debian:~$ …

cve cve-2021-4034 devops linux poc security vulnerability

Senior Security Engineer - Detection and Response

@ Fastly, Inc. | US (Remote)

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Defensive Cyber Operations Engineer-Mid

@ ISYS Technologies | Aurora, CO, United States

Manager, Information Security GRC

@ OneTrust | Atlanta, Georgia

Senior Information Security Analyst | IAM

@ EBANX | Curitiba or São Paulo

Senior Information Security Engineer, Cloud Vulnerability Research

@ Google | New York City, USA; New York, USA