[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Apache 2.2.17 exploit?
- To: Kai <kai@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Apache 2.2.17 exploit?
- From: halfdog <me@xxxxxxxxxxx>
- Date: Tue, 04 Oct 2011 21:57:41 +0000
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Kai,
Kai wrote:
> Hi halfdog,
>
>> Just for those, who want to build their own apache shell code
>> for testing purposes, this snip might be of some use. It uses the
>> still open tcp connections to the server to spawn the shells, so
>> that no backconnect is needed. Of course, it does not give remote
>> root but only httpd user privs. And you should send "exec 1>&0"
>> as first command if you want to see remote shell stdout.
>
> wasn't that bug fixed a long ago?
> https://bugs.php.net/bug.php?id=38915 --->
> https://issues.apache.org/bugzilla/show_bug.cgi?id=46425 sorry if
> i'm talking about different thing.
Thanks for the link. I have to look into it closer, perhaps my code is
just working because I dup2 the fd to stdin before exec, which might
get rid of the FD_CLOEXEC. At least in tests, where I injected code
into mpm-worker on x86 (32bit) using gdb and other methods, it
succeeded in giving me remote shell.
hd
- --
http://www.halfdog.net/
PGP: 156A AE98 B91F 0114 FE88 2BD8 C459 9386 feed a bee
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFOi4EzxFmThv7tq+4RAvyTAJoD41tl+gapCGhgYbkuCZrdaSqpkgCfZ5Ew
HXuO9fRUHd4bJWyTu0QaWi0=
=2uWq
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/