It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(2 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
0xor0ne | https://github.blog/2021-06-10-privilege-escalation-polkit-... | Source 0xor0ne 1624490971521073159 | 2023/02/12 |
0xor0ne | https://twitter.com/0xor0ne/status/1624490971521073159/photo/1 | Source 0xor0ne 1624490971521073159 | 2023/02/12 |
ipssignatures | https://twitter.com/0xor0ne/status/1624490971521073159 | Source ipssignatures 1624530215283175425 | 2023/02/12 |
ipssignatures | https://twitter.com/0xor0ne/status/1624490971521073159 | Source ipssignatures 1624742128927514625 | 2023/02/12 |
CVEtrends | https://cvetrends.com | Source CVEtrends 1624770308061241345 | 2023/02/12 |
ipssignatures | https://twitter.com/0xor0ne/status/1624490971521073159 | Source ipssignatures 1624832719942217732 | 2023/02/13 |
ipssignatures | https://twitter.com/0xor0ne/status/1624490971521073159 | Source ipssignatures 1625134707959648256 | 2023/02/13 |
ipssignatures | https://twitter.com/0xor0ne/status/1624490971521073159 | Source ipssignatures 1625164901797834752 | 2023/02/14 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
vulmon.com | 1786 |
alerts.vulmon.com | 188 |
twinybots.ch | 39 |
securityaffairs.co | 7 |
twitter.com | 6 |
www.youtube.com | 5 |
github.blog | 4 |
thehackernews.com | 4 |
ift.tt | 3 |
github.com | 3 |
tryhackme.com | 3 |
noahblog.360.cn | 3 |
access.redhat.com | 3 |
www.hackplayers.com | 3 |
www.hackingarticles.in | 3 |
packetstormsecurity.com | 3 |
www.bleepingcomputer.com | 3 |
User | URL | Info Source |
---|---|---|
0xor0ne | github.blog | Show Tweet |
0xor0ne | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
CVEtrends | cvetrends.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
Name | URL |
---|---|
Almorabea/Polkit-exploit | https://github.com/Almorabea/Polkit-exploit |
secnigma/CVE-2021-3560-Polkit-Privilege-Esclation | https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-Esclation |
RicterZ/CVE-2021-3560-Authentication-Agent | https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent |
swapravo/polkadots | https://github.com/swapravo/polkadots |
hakivvi/CVE-2021-3560 | https://github.com/hakivvi/CVE-2021-3560 |
WinMin/CVE-2021-3560 | https://github.com/WinMin/CVE-2021-3560 |
0dayNinja/CVE-2021-3560 | https://github.com/0dayNinja/CVE-2021-3560 |
AssassinUKG/Polkit-CVE-2021-3560 | https://github.com/AssassinUKG/Polkit-CVE-2021-3560 |
chenaotian/CVE-2021-3560 | https://github.com/chenaotian/CVE-2021-3560 |
BizarreLove/CVE-2021-3560 | https://github.com/BizarreLove/CVE-2021-3560 |
Name | URL |
---|---|
Almorabea/Polkit-exploit | github.com |
secnigma/CVE-2021-3560-Polkit-Privilege-Esclation | github.com |
RicterZ/CVE-2021-3560-Authentication-Agent | github.com |
swapravo/polkadots | github.com |
hakivvi/CVE-2021-3560 | github.com |
WinMin/CVE-2021-3560 | github.com |
0dayNinja/CVE-2021-3560 | github.com |
AssassinUKG/Polkit-CVE-2021-3560 | github.com |
chenaotian/CVE-2021-3560 | github.com |
BizarreLove/CVE-2021-3560 | github.com |