Skip to content

guinea-offensive-security/CVE-2025-6019

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2025-6019 Proof of Concept (PoC)

This repository contains a Proof of Concept (PoC) script for CVE-2025-6019, a Local Privilege Escalation (LPE) vulnerability in libblockdev and udisks. The script creates an XFS filesystem image with an SUID bash binary and exploits the vulnerability to mount it without the nosuid option, allowing a root shell.

WARNING: This PoC is for educational and testing purposes only. Use it only on systems you are authorized to test. Unauthorized use is illegal and unethical.

Exploit Demo

Features

  • Local Mode: Creates a 300 MB XFS image with an SUID bash binary (requires root).
  • Target Mode: Exploits the vulnerability on a target system to gain a root shell.
  • Robust Error Handling: Includes retries for filesystem resize and SUID checks, with detailed debugging output.
  • Persistent Mount on Success: Keeps the filesystem mounted with a background process if the exploit succeeds, preserving the SUID binary.
  • Cleanup: Removes temporary files, loop devices, and mounts on failure; manual cleanup required on success.

Prerequisites

Operating System:

  • Tested on:
    • openSUSE Leap 15.6
    • Kali GNU/Linux Rolling 2023.4 (kernel 6.6.15-amd64); may work on other Linux distributions with vulnerable udisks2/libblockdev versions (e.g., Kali Linux).
  • Dependencies:
    • dd, mkfs.xfs, mount, umount, udisksctl, gdbus, killall, grep, chmod, cp
    • Install on Debian-based systems: sudo apt-get install coreutils xfsprogs udisks2 libblockdev-utils
    • Install on RPM-based systems: sudo zypper install coreutils xfsprogs udisks2 libblockdev
  • Root Access: Required for [L]ocal mode to create the XFS image.
  • Vulnerable System: A system with a vulnerable version of udisks2/libblockdev (specific versions for CVE-2025-6019 are unknown; verify manually).

Usage

$ git clone https://github.com/guinea-offensive-security/CVE-2025-6019
$ cd CVE-2025-6019
$ chmod +x exploit.sh
$ bash exploit.sh

Then generate the xfs.image and transfert it into your victim Machine with the exploit.sh & then execute it with the C flag

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages