But I’m not going to study its internal principle,just want to exploit this vulnerability accroding to the article which is published on twitter.
Learning makes me happy :)
I will run the exploit code on different kinds of linux to reproduce this vulnerability.
Kali Liunx 2019.4
Press enter or click to view image in full size
Enviromental Information
Press enter or click to view image in full size
Kali Linux Exploit
Ubuntu 18.04
Press enter or click to view image in full size
ubuntu 16.04(It didn’t work)
Press enter or click to view image in full size
ubuntu16.04
Centos6(It didn’t work)
Press enter or click to view image in full size
Centos6
Other
But I found it did not work on centos6,and ubuntu version< 2018,and due to conditions that I do not have all kinds of linux system,so only partly system are tested.