vendor:
Xorg-X11-Server
by:
@bolonobolo
6.6
CVSS
MEDIUM
Local Privilege Escalation
264
CWE
Product Name: Xorg-X11-Server
Affected Version From: 1.19.5
Affected Version To: 1.20.1
Patch Exists: YES
Related CWE: CVE-2018-14665
CPE: a:xorg:xorg-x11-server
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-14665/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-14665/
Other Scripts:
N/A
Platforms Tested: RHEL 7.3 && 7.5
2018
xorg-x11-server < 1.20.1 - Local Privilege Escalation (RHEL 7)
The only condition that have to be met for this PE to work via SSH, is that the legitimate non-root user has to be logged in trought console at the moment the PE script launched. In fact during the logged in session of the legitimate non-root user, a file with the name of the non-root user will be created in the /var/run/console folder. With that file present, the same non-root user can launch a Xorg command via SSH.
Mitigation:
Ensure that the legitimate non-root user is not logged in trought console at the moment the PE script is launched.