Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Path: blob/master/documentation/modules/exploit/solaris/sunrpc/sadmind_exec.md
Views: 18602
Vulnerable Application
This exploit targets a weakness in the default security settings of the Sun Solstice AdminSuite distributed system administration daemon (sadmind) RPC application. This server is installed and enabled by default on most versions of the Solaris operating system.
Vulnerable systems include Solaris 2.7, 8, and 9.
This module has been successfully tested on:
Solaris 8 02/00 (x86);
Solaris 8u1 06/00 (x86);
Solaris 8u2 10/00 (x86);
Solaris 8u3 01/01 (x86);
Solaris 8u4 04/01 (x86);
Solaris 9u2 12/02 (x86).
Verification Steps
Start
msfconsole
Do:
use exploit/solaris/sunrpc/sadmind_exec
Do:
set rhosts [rhost]
Do:
exploit
You should get a new session as the
root
user.
Options
HOSTNAME
Remote hostname. The hostname will be detected automatically by default; however, using the automatically detected hostname will fail if the system hostname was changed after the sadmind service was started.
GID
GID to emulate (default: 0
)
UID
UID to emulate (default: 0
)