vendor:
screen
by:
Manuel Andreas
6.5
CVSS
MEDIUM
Privilege Escalation
269
CWE
Product Name: screen
Affected Version From: 4.9.2000
Affected Version To: 4.9.2000
Patch Exists: NO
Related CWE: CVE-2023-24626
CPE: a:gnu:screen:4.9.0
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-24626/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-24626/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-24626/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp10-cve-2023-24626/
Platforms Tested: Arch Linux
2023
GNU screen v4.9.0 – Privilege Escalation
This exploit is a proof-of-concept for sending SIGHUP as root utilizing GNU screen configured as setuid root. It works by connecting to the socket of a GNU screen instance and sending a query with a command to send SIGHUP to a specified process. The exploit is written in Python and requires the target to have GNU screen installed and configured as setuid root.
Mitigation:
Disable setuid root on GNU screen, or remove it from the system.