vendor:
esRunCommand and estaskwrapper
by:
None
7,2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: esRunCommand and estaskwrapper
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2010-3895
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2010
Privilege escalation in two applications (CVE-2010-3895)
Root SUID bits are set for the applications »esRunCommand« and »estaskwrapper«. esRunCommand takes one argument and runs it as root. The application »estaskwrapper« is meant to start the application »estasklight«. If the user has the environment variable »ES_LIBRARY_PATH« set, the value is copied to two new environment variables »LD_LIBRARY_PATH« and »LIBPATH«. If the »auth« flag is set, the application »estasklight« is executed. An exploit for running /bin/sh is to copy /bin/sh to ~/bin/estasklight, set the environment variable ES_LIBRARRY_PATH to ~/bin and run /opt/IBM/es/bin/estaskwrapper estasklight.
Mitigation:
Ensure that the SUID bits are not set for the applications esRunCommand and estaskwrapper.