CVE-2007-4993

Xen 3.0.3 - Authenticated Remote Code Execution via Crafted grub.conf File

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-4993. PoCs published by Joris van Rantwijk.

AI-analyzed exploit summary This exploit leverages a command injection vulnerability in Xen's pygrub script by embedding Python commands in the grub.conf file. The 'default' statement is manipulated to execute arbitrary commands with elevated privileges.

Description

pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Joris van Rantwijk · textlocallinux
https://www.exploit-db.com/exploits/30620

This exploit leverages a command injection vulnerability in Xen's pygrub script by embedding Python commands in the grub.conf file. The 'default' statement is manipulated to execute arbitrary commands with elevated privileges.

Classification
Working Poc 90%
Attack Type
Lpe
Complexity
Trivial
Reliability
Reliable
Target: Xen 3.0.3
Auth required
Prerequisites: Local access to the system · Ability to modify grub.conf
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (21)

Core 21
Core References
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
Issue Tracking x_refsource_confirm
https://issues.rpath.com/browse/RPL-1752
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26986
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2007-0323.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11240
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-527-1
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27141
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27047
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27486
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27085
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27103
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/481825/100/0/threaded
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27161
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25825
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27072
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2007/dsa-1384
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/3348

Scores

EPSS 0.0027
EPSS Percentile 51.0%

Details

CWE
CWE-20
Status published
Products (1)
xensource_inc/xen 3.0.3
Published Sep 27, 2007
Tracked Since Feb 18, 2026