Full Disclosure mailing list archives

Re: Redhat/CentOS root through network-scripts


From: Victor Angelier CCX <vangelier () hotmail com>
Date: Wed, 17 Apr 2019 06:43:28 +0000

sounds clear, thanks!


Met vriendelijke groet,

Kind regards,




the Coding Company


[cid:6ccbe4bb-c1c0-4df5-9d4b-636a22d7d37a]



V.A. (Victor) Angelier

CISO,Certified Hacker, CAST611 Certified Advanced Pentester, DevOps


PGP: 612C4BB2<https://pgp.mit.edu/pks/lookup?op=get&search=0x0188D45D612C4BB2>

T: +31 55 302 00 10 (Main number)

M: +46 76 835 6450 (Swedish)

M: +31 6 195 22 602 (Dutch)

E: victor () thecodingcompany se

W: www.thecodingcompany.se<http://www.thecodingcompany.se/>


Official OWASP Member (Id:000015019)


[cid:cf206409-ed01-433f-a696-d01c4f3a1fb2]



PGP versleutelde correspondentie heeft mijn voorkeur. | I prefer PGP Encrypted communication.



"Knowledge is power" - Sir Francis Bacon | To change something; don't fight existing models but build a new model that 
makes the existing model obsolete


------------------------------ DISCLAIMER ----------------------------

De informatie verzonden met dit e-mail bericht is Uitsluitend bestemd voor de geadresseerde. Openbaarmaking, 
vermenigvuldiging, verspreiding en/of verstrekking aan derden is niet toegestaan. Gebruik van deze informatie door 
anderen dan de geadresseerde is verboden. U wordt verzocht bij onjuiste adressering de afzender direct te informeren 
door het bericht te retourneren.



The information sent by means of this e-mail message is intended only for the use of the addressee. Publication, 
duplication, distribution and/or forwarding to third Parties of this message, as well as use of the information by 
other persons than the intended recipient, is strictly prohibited. If you have received this communication in error, 
please notify the sender immediately by returning it.


________________________________
From: Kurt H Maier <khm () sciops net>
Sent: Tuesday, April 16, 2019 22:20
To: Victor Angelier CCX
Cc: fulldisclosure () seclists org
Subject: Re: [FD] Redhat/CentOS root through network-scripts

On Mon, Apr 15, 2019 at 09:36:39AM +0000, Victor Angelier CCX wrote:
Hi there,

Just found an issue in Redhat/CentOS which according to RedHat
security team is not an issue. I don't know, sounds weird to me.

If, for whatever reason, a user is able to write an ifcf-<whatever>
script to /etc/sysconfig/network-scripts or it can adjust an existing
one, then your system in pwned.

Network scripts, ifcg-eth0 for example are used for network
connections. The look exactly like .INI files. However, they are
~sourced~ on Linux by Network Manager (dispatcher.d).

Yes, if a root-user process executes a script as root then the resulting
commands are indeed run as root.

Those are not INI files, they are shell scripts that set environment
variables.  If you do not want your users to have root access on your
computer, do not let them edit files that are run as root.

Your example command configures the environment variable NAME to have
the value 'Network' when the shell runs /bin/id.

This is why NetowrkManager uses interprocess communications to send
user-driven configuration directives to root-permissioned daemons.
There are other linux distributions that have different methods for
configuring networks, but there is nothing wrong with shell commands,
even when the root user runs them.  Just don't let users edit files in
/etc -- which is why the permissions on these files and directories are
set the way they are.

khm


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: