vendor:
N/A
by:
Dawid Golunski
7,8
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2016-1247
CPE: N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian-based systems (Debian, Ubuntu as well as Gentoo etc.)
2016
Nginx (Debian-based distros + Gentoo) – Root Privilege Escalation PoC Exploit
This PoC exploit allows local attackers on Debian-based systems (Debian, Ubuntu as well as Gentoo etc.) to escalate their privileges from nginx web server user (www-data) to root through unsafe error log handling. The exploit waits for Nginx server to be restarted or receive a USR1 signal. On Debian-based systems the USR1 signal is sent by logrotate (/etc/logrotate.d/nginx) script which is called daily by the cron.daily on default installations.
Mitigation:
Ensure that the Nginx error log is configured to be owned by root and is not writable by any other user.