Skip to content

Commit e8a34c5

Browse files
committed
updates to docs
1 parent 98ad754 commit e8a34c5

File tree

1 file changed

+26
-4
lines changed

1 file changed

+26
-4
lines changed

documentation/modules/exploit/linux/samba/is_known_pipename.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,20 +10,42 @@ for this exploit to be successful:
1010

1111
However, in some cases anonymous access with common filesystem locations can be used to automate exploitation.
1212

13+
A vulnerable Samba config may have a share similar to the following in `smb.conf`. This is a setup for 'easy' exploitation
14+
where no SMB options are required to be set:
15+
16+
```
17+
[exploitable]
18+
comment = CVE-2017-7494
19+
path = /tmp
20+
writable = yes
21+
browseable = yes
22+
guest ok = yes
23+
```
24+
1325
Verified on:
1426

1527
1. Synology DS412+ DSM 6.1.1-15101 Update 2 (Samba 4.4.9)
1628
2. Synology DS412+ DSM 6.1.1-15101 Update 3 (Samba 4.4.9)
1729
3. Synology DS1512+ DSM 6.1.1-15101 Update 2 (Samba 4.4.9)
1830
4. Synology DS1512+ DSM 6.1.1-15101 Update 3 (Samba 4.4.9)
19-
5. Ubuntu 16.04 (**HDM PLEASE PUT THE Samba version here**)
20-
6. Synology **HDM PLEASE PUT THE DSM VERSION HERE** (**HDM PLEASE PUT THE Samba version here**)
31+
5. Synology DS2415+ DSM 6.1-15047 (Samba 4.3.11)
32+
6. Ubuntu 14.04.5 x64 (Samba 4.3.9)
2133
7. Ubuntu 15.04 (Samba 4.1.13)
34+
8. Ubuntu 16.04 (Samba 4.3.11)
35+
9. Fedora 24 (Samba 4.4.13)
2236

2337
Currently not working against:
2438

25-
1. QNAP Nas Samba 4.4.9 on armv71
26-
2. WD NAS armv71 **@wwebb-r7 PLEASE PUT Samba VERSION HERE**
39+
1. QNAP NAS Samba 4.4.9 on armv71
40+
2. WD MyClous NAS Samba 4.0.0rc5 armv71
41+
42+
### SELinux
43+
44+
Fedora (and possibly Redhat) are not exploitable in their default installation. SELinux must be adjusted to allow nmbd to use net_admin, and smbd to exec the payload.
45+
46+
```
47+
echo -ne "type=AVC msg=audit(1495745298.086:334): avc: denied { execstack } for pid=2365 comm="smbd" scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:system_r:smbd_t:s0 tclass=process permissive=0\ntype=AVC msg=audit(1495717997.099:267): avc: denied { net_admin } for pid=959 comm="nmbd" capability=12 scontext=system_u:system_r:nmbd_t:s0 tcontext=system_u:system_r:nmbd_t:s0 tclass=capability permissive=0\ntype=AVC msg=audit(1495745002.690:308): avc: denied { execmem } for pid=1830 comm="smbd" scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:system_r:smbd_t:s0 tclass=process permissive=0\ntype=AVC msg=audit(1495745183.319:331): avc: denied { execute } for pid=2313 comm="smbd" path="/tmp/ucFtDpZI.so" dev="tmpfs" ino=27436 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:smbd_tmp_t:s0 tclass=file permissive=0" | audit2allow -M cve-2017-7494; semodule -X 300 -i cve-2017-7494.pp
48+
```
2749

2850
## Verification Steps
2951

0 commit comments

Comments
 (0)