Penetration Testing mailing list archives

Re: Mac symlink attack techniques?


From: "Paul Melson" <pmelson () gmail com>
Date: Sat, 12 Apr 2008 12:35:49 -0400

On Fri, Apr 11, 2008 at 3:52 AM, Jon Hart <jhart () spoofed org> wrote:
I'm curious if anyone has some input on this.  I am in a situation where
I am able to perform a symlink attack against a process that runs as
root on a Mac.  The catch is that I can create files that don't exist
and get them be created mode 666 for world writable goodness, but if the
symlink points to a file that already exists all I can do is clobber its
content with garbage.

Clearly, havoc can be made by trashing important files, but I'm looking
for an elegant and quick method for privilege escalation.  Is
/etc/ld.so.conf my only option?

You can create /etc/rc.installer_cleanup which typically doesn't
usually exist, but if it does is run by init to complete software
installs after reboot.
If you are able to also force a reboot (or even count on one occurring
at a certain time), it's pretty much game over.

PaulM

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: