Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/qnx/local/ifwatchd_priv_esc.md
Views: 11789
Description
This module attempts to gain root privileges on QNX 6.4.x and 6.5.x systems by exploiting the ifwatchd
suid executable.
Vulnerable Application
ifwatchd
allows users to specify scripts to execute using the -A
command line argument; however, it does not drop privileges when executing user-supplied scripts, resulting in execution of arbitrary commands as root.
This module has been tested successfully on:
QNX Neutrino 6.5.0 (x86)
QNX Neutrino 6.5.0 SP1 (x86)
QNX Neutrino 6.5.0 Service Pack 1 is available here:
Verification Steps
Start
msfconsole
use exploit/qnx/local/ifwatchd_priv_esc
set session <ID>
run
You should get a root session
Options
SESSION
Which session to use, which can be viewed with sessions
WritableDir
A writable directory file system path. (default: /tmp
)