Linux Apport/Abrt Local Root Exploit
#define _GNU_SOURCE #include <stdio.h> #include <unistd.h> #include <stdlib.h> #include <fcntl.h> #include <signal.h> #include <elf.h> #include <err.h>...
View ArticleLinux Abrt / Apport Race Condition / Symlink
Hello, this is CVE-2015-1318 and CVE-2015-1862 (essentially the same bugs in two different implementations, apport and abrt respectively). These were discussed on the vendors list last week. If the...
View ArticleCumulus Linux’s Switch clcmd_server Local Privilege Escalation
Title =================== Cumulus Linux's Switch Configuration Tools Backend, clcmd_server, Vulnerable to Local Privilege Escalation Summary =================== Cumulus Linux's Switch Configuration...
View ArticleCentOS 7.1 / Fedora 22 abrt Local Root
#!/usr/bin/python # CVE-2015-5273 + CVE-2015-5287 # CENTOS 7.1/Fedora22 local root (probably works on SL and older versions too) # abrt-hook-ccpp insecure open() usage + abrt-action-install-debuginfo...
View ArticleRHEL 7.0 / 7.1 abrt / sosreport Local Root
#!/usr/bin/python # CVE-2015-5287 (?) # abrt/sosreport RHEL 7.0/7.1 local root # rebel 09/2015 # [user@localhost ~]$ python sosreport-rhel7.py # crashing pid 19143 # waiting for dump directory #...
View ArticleImparare a sfruttare vulnerabilità: Kioptrix Livello 3
Ed eccoci al penultimo livello! Come al solito, la macchina virtuale si trova a questo indirizzo. Per chi si fosse perso i livelli precedenti, nel livello 1 sono entrato nel dispositivo utilizzando...
View ArticleLinux BPF Local Privilege Escalation
#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifndef __NR_bpf # if...
View ArticleLinux Kernel Dirty COW PTRACE_POKEDATA Privilege Escalation
// // This exploit uses the pokemon exploit as a base and automatically // generates a new passwd line. The original /etc/passwd is then // backed up to /tmp/passwd.bak and overwritten with the new...
View ArticleDa WordPress a root con Hackademic
Imparare a sfruttare le vulnerabilità su macchine di prova permette di potersi allenare e poter, in un futuro, riuscire a trovarle su dispositivi reali, con tutte le difficoltà collegate ad esse. In...
View Article