From b00b808966a3c75da19449af93282bada7db652c Mon Sep 17 00:00:00 2001 From: Metasploit Date: Thu, 26 Sep 2024 14:31:49 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 61 +++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 8e28ed0ba924..960f7a06cb2b 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -86832,6 +86832,67 @@ ] }, + "exploit_linux/local/cve_2023_0386_overlayfs_priv_esc": { + "name": "Local Privilege Escalation via CVE-2023-0386", + "fullname": "exploit/linux/local/cve_2023_0386_overlayfs_priv_esc", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2023-03-22", + "type": "exploit", + "author": [ + "xkaneiki", + "sxlmnwb", + "Takahiro Yokoyama" + ], + "description": "This exploit targets the Linux kernel bug in OverlayFS.\n\n A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities\n was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount.\n This uid mapping bug allows a local user to escalate their privileges on the system.", + "references": [ + "CVE-2023-0386", + "URL-https://github.com/sxlmnwb/CVE-2023-0386", + "URL-https://github.com/DataDog/security-labs-pocs/tree/main/proof-of-concept-exploits/overlayfs-cve-2023-0386", + "URL-https://securitylabs.datadoghq.com/articles/overlayfs-cve-2023-0386/", + "URL-https://www.vicarius.io/vsociety/posts/cve-2023-0386-a-linux-kernel-bug-in-overlayfs" + ], + "platform": "Linux", + "arch": "x64", + "rport": null, + "autofilter_ports": [ + + ], + "autofilter_services": [ + + ], + "targets": [ + "Automatic" + ], + "mod_time": "2024-09-24 08:18:30 +0000", + "path": "/modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb", + "is_install_path": true, + "ref_name": "linux/local/cve_2023_0386_overlayfs_priv_esc", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Reliability": [ + "repeatable-session" + ], + "Stability": [ + "crash-safe" + ], + "SideEffects": [ + "artifacts-on-disk" + ] + }, + "session_types": [ + "shell", + "meterpreter" + ], + "needs_cleanup": true, + "actions": [ + + ] + }, "exploit_linux/local/desktop_privilege_escalation": { "name": "Desktop Linux Password Stealer and Privilege Escalation", "fullname": "exploit/linux/local/desktop_privilege_escalation",