Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37704 PoC — Amanda 命令注入漏洞

Source
Associated Vulnerability
Title:Amanda 命令注入漏洞 (CVE-2022-37704)
Description:Amanda是University of Maryland at College Park组织的一种自动网络磁盘存档器。允许 IT 管理员设置单个主备份服务器,以通过网络将多个主机备份到磁带驱动器/转换器或磁盘或光学介质。 Amanda存在安全漏洞,该漏洞源于在rundump存在本地权限提升。
Description
Amanda 3.5.1 LPE
Readme
> [Suggested description]
> Amanda 3.5.1 has a flaw that allows privilege escalation from the
> regular user backup to root. The SUID binary located at
> /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled
> arguments from the attacker which may lead to escalation of privileges,
> denial of service, and information disclosure.
>
> ------------------------------------------
>
> [Additional Information]
> Amanda is a well known software and the package is present on all known Linux distributions and even on Windows.
> I think this bug is critical for that specific software, I may say this a trust vulnerability (the rundump binary trust /usr/sbin/dump) but unfortunately dump can be tampered with to have root shell.
> I will upload a PoC video when sending the e-mail!
>
> ------------------------------------------
>
> [VulnerabilityType Other]
> External software flaw
>
> ------------------------------------------
>
> [Vendor of Product]
> Amanda
>
> ------------------------------------------
>
> [Affected Product Code Base]
> rundump - 3.5.1
>
> ------------------------------------------
>
> [Affected Component]
> The affected component is rundump SUID binary from Amanda software.
> The affected C file is : rundump.c
> The affected line of code is :     execve(dump_program, argv, env);
>
> ------------------------------------------
>
> [Attack Type]
> Local
>
> ------------------------------------------
>
> [Impact Denial of Service]
> true
>
> ------------------------------------------
>
> [Impact Escalation of Privileges]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> This vulnerability is an LPE to root.
> To exploit the flaw and become root the attacker should execute a bash script.
>
> ------------------------------------------
>
> [Reference]
> http://www.amanda.org/
>
> ------------------------------------------
>
> [Discoverer]
> Maher Azzouzi

Use CVE-2022-37704.
File Snapshot

[4.0K] /data/pocs/0321b7bf59306b5d7a17bd524b797805eef4f186 └── [2.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.