lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4E8B8155.3090604@halfdog.net> Date: Tue, 04 Oct 2011 21:57:41 +0000 From: halfdog <me@...fdog.net> To: Kai <kai@...nn.net> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Apache 2.2.17 exploit? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello Kai, Kai wrote: > Hi halfdog, > >> Just for those, who want to build their own apache shell code >> for testing purposes, this snip might be of some use. It uses the >> still open tcp connections to the server to spawn the shells, so >> that no backconnect is needed. Of course, it does not give remote >> root but only httpd user privs. And you should send "exec 1>&0" >> as first command if you want to see remote shell stdout. > > wasn't that bug fixed a long ago? > https://bugs.php.net/bug.php?id=38915 ---> > https://issues.apache.org/bugzilla/show_bug.cgi?id=46425 sorry if > i'm talking about different thing. Thanks for the link. I have to look into it closer, perhaps my code is just working because I dup2 the fd to stdin before exec, which might get rid of the FD_CLOEXEC. At least in tests, where I injected code into mpm-worker on x86 (32bit) using gdb and other methods, it succeeded in giving me remote shell. hd - -- http://www.halfdog.net/ PGP: 156A AE98 B91F 0114 FE88 2BD8 C459 9386 feed a bee -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFOi4EzxFmThv7tq+4RAvyTAJoD41tl+gapCGhgYbkuCZrdaSqpkgCfZ5Ew HXuO9fRUHd4bJWyTu0QaWi0= =2uWq -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists