Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/unix/local/emacs_movemail.md
Views: 11789
Vulnerable Application
Description
This module exploits a SUID installation of the Emacs movemail
utility to run a command as root by writing to 4.3BSD's /usr/lib/crontab.local
.
The vulnerability is documented in Cliff Stoll's book The Cuckoo's Egg.
Setup
A Docker environment for 4.3BSD on VAX is available at https://github.com/wvu/ye-olde-bsd.
For manual setup, please follow the Computer History Wiki's guide or Allen Garvin's guide if you're using Quasijarus.
Verification Steps
Targets
0
This uses /usr/lib/crontab.local
to execute code.
Options
MOVEMAIL
Set this to the absolute path to the SUID-root movemail
executable.
CMD
If your payload is cmd/unix/generic
(suggested default), set this to the command you want to run as root. The provided default will create a SUID-root shell at /tmp/sh
.