Full Disclosure mailing list archives
Re: Redhat/CentOS root through network-scripts
From: Victor Angelier CCX <vangelier () hotmail com>
Date: Wed, 17 Apr 2019 06:43:28 +0000
sounds clear, thanks! Met vriendelijke groet, Kind regards, the Coding Company [cid:6ccbe4bb-c1c0-4df5-9d4b-636a22d7d37a] V.A. (Victor) Angelier CISO,Certified Hacker, CAST611 Certified Advanced Pentester, DevOps PGP: 612C4BB2<https://pgp.mit.edu/pks/lookup?op=get&search=0x0188D45D612C4BB2> T: +31 55 302 00 10 (Main number) M: +46 76 835 6450 (Swedish) M: +31 6 195 22 602 (Dutch) E: victor () thecodingcompany se W: www.thecodingcompany.se<http://www.thecodingcompany.se/> Official OWASP Member (Id:000015019) [cid:cf206409-ed01-433f-a696-d01c4f3a1fb2] PGP versleutelde correspondentie heeft mijn voorkeur. | I prefer PGP Encrypted communication. "Knowledge is power" - Sir Francis Bacon | To change something; don't fight existing models but build a new model that makes the existing model obsolete ------------------------------ DISCLAIMER ---------------------------- De informatie verzonden met dit e-mail bericht is Uitsluitend bestemd voor de geadresseerde. Openbaarmaking, vermenigvuldiging, verspreiding en/of verstrekking aan derden is niet toegestaan. Gebruik van deze informatie door anderen dan de geadresseerde is verboden. U wordt verzocht bij onjuiste adressering de afzender direct te informeren door het bericht te retourneren. The information sent by means of this e-mail message is intended only for the use of the addressee. Publication, duplication, distribution and/or forwarding to third Parties of this message, as well as use of the information by other persons than the intended recipient, is strictly prohibited. If you have received this communication in error, please notify the sender immediately by returning it. ________________________________ From: Kurt H Maier <khm () sciops net> Sent: Tuesday, April 16, 2019 22:20 To: Victor Angelier CCX Cc: fulldisclosure () seclists org Subject: Re: [FD] Redhat/CentOS root through network-scripts On Mon, Apr 15, 2019 at 09:36:39AM +0000, Victor Angelier CCX wrote:
Hi there, Just found an issue in Redhat/CentOS which according to RedHat security team is not an issue. I don't know, sounds weird to me. If, for whatever reason, a user is able to write an ifcf-<whatever> script to /etc/sysconfig/network-scripts or it can adjust an existing one, then your system in pwned. Network scripts, ifcg-eth0 for example are used for network connections. The look exactly like .INI files. However, they are ~sourced~ on Linux by Network Manager (dispatcher.d).
Yes, if a root-user process executes a script as root then the resulting commands are indeed run as root. Those are not INI files, they are shell scripts that set environment variables. If you do not want your users to have root access on your computer, do not let them edit files that are run as root. Your example command configures the environment variable NAME to have the value 'Network' when the shell runs /bin/id. This is why NetowrkManager uses interprocess communications to send user-driven configuration directives to root-permissioned daemons. There are other linux distributions that have different methods for configuring networks, but there is nothing wrong with shell commands, even when the root user runs them. Just don't let users edit files in /etc -- which is why the permissions on these files and directories are set the way they are. khm
_______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Redhat/CentOS root through network-scripts Victor Angelier CCX (Apr 16)
- Re: Redhat/CentOS root through network-scripts Kurt H Maier (Apr 18)
- Re: Redhat/CentOS root through network-scripts Victor Angelier CCX (Apr 18)
- Re: Redhat/CentOS root through network-scripts Kurt H Maier (Apr 18)