Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-5284 PoC — OSSEC 不安全临时文件创建漏洞

Source
Associated Vulnerability
Title:OSSEC 不安全临时文件创建漏洞 (CVE-2014-5284)
Description:OSSEC是OSSEC团队开发的一套开源的多平台入侵检测系统。该系统提供日志分析、文件完整性检测和实时报警等功能。 OSSEC 2.8.1之前版本的host-deny.sh文件中存在安全漏洞,该漏洞源于程序向带有特制文件名的临时文件写入数据时没有验证所有权。本地攻击者可通过在程序执行IP自动封锁前,创建临时文件利用该漏洞在hosts.deny文件中修改访问权限,并获取root权限。
Description
Bash implementation of CVE-2014-5284
Readme
# CVE-2014-5284
Bash implementation of CVE-2014-5284

Exploit Title: ossec 2.8 Insecure Temporary File Creation Vulnerability Privilege Escalation</br>
Python is nice but doesn't work all the time</br>
Exploit Author: mbadanoiu</br>
</br>
Python Exploit Author: skynet-13</br>
Vendor Homepage: www.ossec.net/</br>
Software Link: https://github.com/ossec/ossec-hids/archive/2.8.1.tar.gz</br>
Version: OSSEC  - 2.8</br>
</br>
Created from Research by</br>
Jeff Petersen</br>
Roka Security LLC</br>
jpetersen@rokasecurity.com</br>
Original info at https://github.com/ossec/ossec-hids/releases/tag/2.8.1</br>
</br>
Kudos To: Radu Voicilas (rvoicilas) for the inotify-tools</br>
https://github.com/rvoicilas/inotify-tools
File Snapshot

[4.0K] /data/pocs/e671b6c4149bcf7effe1fc3db28a2e0ac266cb6f ├── [2.4K] CVE-2014-5284.sh ├── [4.0K] inotify-tools ├── [3.0K] ossec_host_deny.py └── [ 717] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.