vendor:
HP-UX
by:
Kyong-won,Cho
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: HP-UX
Affected Version From: HP-UX 11.00
Affected Version To: HP-UX 11.00
Patch Exists: NO
Related CWE: N/A
CPE: o:hp:hp-ux:11.00
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: HP-UX
2002
HP-UX 11.00 crontab
A vulnerability in crontab exists that allows a user to read any file on an HP-UX system. To create a crontab, a user must execute the command 'crontab -e'. Executing this command launches the vi editor, creates a file in the /tmp directory with the ownership delegated to the user running the command. While the file exists in /tmp, the owner of the file may spawn a shell from vi and create a symbolic link to any file on the system. After exiting the spawned shell, then quitting vi, an error message will return the contents of the previously symbolically linked file to the standard output of the user.
Mitigation:
Restrict access to the crontab.allow file and ensure that only trusted users have access to it.