Skip to content

Commit 3c21eb8

Browse files
committed
Update documentation
1 parent 0d80ca6 commit 3c21eb8

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

modules/exploits/linux/local/apport_abrt_chroot_priv_esc.md renamed to documentation/modules/exploit/linux/local/apport_abrt_chroot_priv_esc.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,16 @@
77

88
Apport versions 2.13 through 2.17.x before 2.17.1 on Ubuntu are vulnerable, due to a feature which allows forwarding reports to a container's Apport by changing the root directory before loading the crash report, causing `usr/share/apport/apport` within the crashed task's directory to be executed.
99

10-
Similarly, Fedora is vulnerable when the kernel crash handler is configured to change root directory before executing ABRT, causing `usr/libexec/abrt-hook-ccpp` within the crashed task's directory to be executed.
10+
Similarly, Fedora is vulnerable when the kernel crash handler is configured to change root directory before executing ABRT, causing `usr/libexec/abrt-hook-ccpp` within the crashed task's directory to be executed. Fedora's crash handler was reportedly configured to chroot ABRT by default between April and August 2014.
1111

1212
In both instances, the crash handler does not drop privileges, resulting in code execution as root.
1313

14+
This module has been tested successfully on:
15+
1416
* Apport 2.14.1 on Ubuntu 14.04.1 LTS x86 and x86_64
15-
* ABRT on Fedora 19 and 20 x86_64.
17+
* ABRT on Fedora 19 and 20 x86_64
18+
19+
To test Fedora 20, disable SELinux, reboot, and modify `/proc/sys/kernel/core_pattern` to make use of the vulnerable `core_pattern` : `|/usr/sbin/chroot /proc/%P/root /usr/libexec/abrt-hook-ccpp %s %c %p %u %g %t e`
1620

1721

1822
## Verification Steps

0 commit comments

Comments
 (0)