vendor:
HoleyBeep
by:
Arignir
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: HoleyBeep
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2020
HoleyBeep Exploit
This exploit takes a path to write to (the file must already exist) and rewrites its first bytes to /*/x. This means that if it's a shell script, it will execute /tmp/x as its first and only command. To gain root access, the idea is to use the exploit to overwrite any file in /etc/profile.d/ so it will execute /*/x on the next login, possibly as the root user.
Mitigation:
Ensure that the system is up to date with the latest security patches and that all users have the least privilege necessary to perform their job.