description |
---|
Interactive lab for exploiting Dirty Pipe (CVE-2022-0847) in the Linux Kernel |
{% embed url="https://tryhackme.com/room/dirtypipe" %} https://tryhackme.com/room/dirtypipe {% endembed %}
Room Attributes | Value |
---|---|
Subscription Required | False [Free] |
Type | Walkthrough |
Difficulty | Info |
Tags | Dirty Pipe, CVE-2022-0847, Linux, Kernel |
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
Switch user (su
) into your newly created root account. What is the flag found in the /root/flag.txt
file?
Reveal Flag 🚩
🚩THM{MmU4Zjg0NDdjNjFiZWM5ZjUyZGEyMzlm}
As mentioned previously, we have accidentally overwritten other user accounts by exploiting Dirty Pipe in this manner. This could cause issues for the server; thus, as professionals, we must clean up after our exploits. Using your root shell, restore the original /etc/passwd
file from your backup.
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
[Optional] Find another exploit for this vulnerability online. Review the code to ensure that it does what it claims to do, then upload it to the target and attempt to exploit the vulnerability a third way.
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}