exploit-db-mirror/platforms/linux/local/30620.txt
Offensive Security 30d9cc4c3d Updated 01_04_2014
2014-01-04 23:27:58 +00:00

12 lines
No EOL
621 B
Text
Executable file

source: http://www.securityfocus.com/bid/25825/info
Xen is prone to a local command-injection vulnerability that can lead to privilege escalation.
This issue occurs because the application fails to validate input in the 'tools/pygrub/src/GrubConf.py' script.
This vulnerability affects Xen 3.0.3; other versions may be affected as well.
An attacker can exploit this issue by including Python commands in a configuration file using filesystem utilities. The following proof of concept is available:
Change the 'default' statement in grub.conf to:
default "+str(0*os.system(" insert evil command here "))+"