Polkit pkexec Local Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 4 Mar 2022.

  1. Packet Storm

    Packet Storm Guest

    This is a Metasploit module for the argument processing bug in the polkit pkexec binary. If the binary is provided with no arguments, it will continue to process environment variables as argument variables, but without any security checking. By using the execve call we can specify a null argument list and populate the proper environment variables. This exploit is architecture independent.

    Continue reading...
     

Share This Page

Loading...