# Dirty Pipe: CVE-2022-0847

{% embed url="<https://tryhackme.com/room/dirtypipe>" %}
<https://tryhackme.com/room/dirtypipe>
{% endembed %}

| Room Attributes       | Value                                                                  |
| --------------------- | ---------------------------------------------------------------------- |
| Subscription Required | <mark style="color:green;background-color:green;">False</mark> \[Free] |
| Type                  | Walkthrough                                                            |
| Difficulty            | <mark style="color:blue;background-color:blue;">Info</mark>            |
| Tags                  | Dirty Pipe, CVE-2022-0847, Linux, Kernel                               |

## Task 1 - <mark style="color:green;background-color:green;">Info</mark> Introduction and Deploy

### Deploy the machine by clicking on the green "Deploy" button at the top of this task!

{% hint style="success" %}
No answer needed
{% endhint %}

## Task 2 - <mark style="color:purple;background-color:purple;">Tutorial</mark> Vulnerability Background

### Read the information in the task and understand how Dirty Pipe works.

{% hint style="success" %}
No answer needed
{% endhint %}

## Task 3 - <mark style="color:orange;background-color:orange;">Practical</mark> A Weaponised PoC

### Follow along with the steps described in the task if you haven't already done so.

{% hint style="success" %}
No answer needed
{% endhint %}

### Switch user (`su`) into your newly created root account. What is the flag found in the `/root/flag.txt` file?

<details>

<summary>Reveal Flag <span data-gb-custom-inline data-tag="emoji" data-code="1f6a9">🚩</span></summary>

:triangular\_flag\_on\_post:`THM{MmU4Zjg0NDdjNjFiZWM5ZjUyZGEyMzlm}`

</details>

### As mentioned previously, we have accidentally overwritten other user accounts by exploiting Dirty Pipe in this manner. This could cause issues for the server; thus, as professionals, we must clean up after our exploits. Using your root shell, restore the original `/etc/passwd` file from your backup.

{% hint style="success" %}
No answer needed
{% endhint %}

## Task 4 - <mark style="color:orange;background-color:orange;">Practical</mark> <mark style="color:blue;background-color:blue;">Bonus Task</mark> A Second Exploit

### Exploit the target using bl4sty's exploit for Dirty Pipe

{% hint style="success" %}
No answer needed
{% endhint %}

### Make sure to clean up after yourself! Remove the SUID binary created by the script (`/tmp/sh`).

{% hint style="success" %}
No answer needed
{% endhint %}

### **\[**<mark style="color:purple;">**Optional**</mark>**]** Find another exploit for this vulnerability online. Review the code to ensure that it does what it claims to do, then upload it to the target and attempt to exploit the vulnerability a third way.

{% hint style="success" %}
No answer needed
{% endhint %}

## Task 5 - <mark style="color:green;background-color:green;">Info</mark> Conclusion

### I understand the Dirty Pipe vulnerability!

{% hint style="success" %}
No answer needed
{% endhint %}
