Skip to content

A Local Privilege Escalation flaw has been discovered in the latest version of Etcher <= v1.18.11 that allows an attacker with a low-privileged user account to create a directory named "etcher" under /tmp, when the Admin user runs Etcher in his session, the attacker can achieve LPE.

Notifications You must be signed in to change notification settings

febin0x10/etcher_privesc_exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

etcher_privesc_exploit

A Local Privilege Escalation flaw has been discovered in the latest version of Etcher <= v1.18.11 that allows an attacker with a low-privileged user account to create a directory named "etcher" under /tmp, when the Admin user runs Etcher in his session, the attacker can achieve LPE.

Etcher_privilege_escalation_linux_by_Febin.mp4

About

A Local Privilege Escalation flaw has been discovered in the latest version of Etcher <= v1.18.11 that allows an attacker with a low-privileged user account to create a directory named "etcher" under /tmp, when the Admin user runs Etcher in his session, the attacker can achieve LPE.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages