Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-37703 PoC — Amanda 路径遍历漏洞

Source
Associated Vulnerability
Title:Amanda 路径遍历漏洞 (CVE-2022-37703)
Description:Amanda是University of Maryland at College Park组织的一种自动网络磁盘存档器。允许 IT 管理员设置单个主备份服务器,以通过网络将多个主机备份到磁带驱动器/转换器或磁盘或光学介质。 Amanda 3.5.1版本存在安全漏洞,该漏洞源于在calcsize SUID二进制文件中发现了信息泄漏漏洞。攻击者利用该漏洞知道fs中是否存在目录。
Description
Amanda Information Disclosure bug.
Readme
> [Suggested description]
> In Amanda 3.5.1, an information leak vulnerability was found in
> calcsize SUID binary. The attacker can abuse the vulnerability to know
> if a directory exist or not anywhere in the fs. The binary will use
> `opendir()` as root directly without checking the path, letting the
> attacker provide an arbitrary path. The attacker needs to be the
> `backup` user to be able to run calcsize binary.
>
> ------------------------------------------
>
> [Additional Information]
> The PoC is very simple you just have to run the binary like this:
> ./calcsize MAHER dir1 -X [directory]
> if the binary did not generate any output then the directory is available.
> If it's not available it will say that it is not available like this:
>
> backup@maher:/home/maher/pwn/ubuntu/userland/suid/amanda/sec$ ./calcsize MAHER dir1 -X /etcc
> /etcc/.: No such file or directory
>
> ------------------------------------------
>
> [Vulnerability Type]
> Insecure Permissions
>
> ------------------------------------------
>
> [Vendor of Product]
> Amanda
>
> ------------------------------------------
>
> [Affected Product Code Base]
> calcsize - 3.5.1
>
> ------------------------------------------
>
> [Affected Component]
> Component: calcsize SUID binary.
> C file: calcsize.c
> Line: 435 `if((d = opendir(dirname)) == NULL) {`
>
> ------------------------------------------
>
> [Attack Type]
> Local
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> To exploit the vulnerability the attacker need to have access to the calcsize binary (one of the amanda packages being installed).
>
> ------------------------------------------
>
> [Reference]
> http://www.amanda.org/
>
> ------------------------------------------
>
> [Discoverer]
> Maher Azzouzi
File Snapshot

[4.0K] /data/pocs/5633260077c878eecd3138946b899227b13f1932 └── [1.8K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.