There is a vulnerability in the below program that allows arbitrary programs to be executed, can you find it? Files for this level can be found in /home/flag02.

#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <stdio.h>

int main(int argc, char **argv, char **envp)
{
  char *buffer;
  
  gid_t gid;
  uid_t uid;
  
  gid = getegid();
  uid = geteuid();
  
  setresgid(gid, gid, gid);
  setresuid(uid, uid, uid);
  
  buffer = NULL;
  
  asprintf(&buffer, "/bin/echo %s is cool", getenv("USER"));
  printf("about to call system(\"%s\")\n", buffer);
  
  system(buffer);
}

As the previous level, we here have a suid executable, owned by our target flag02, who uses an environment variable USER to print a super cool message. Let’s try it:

Exploit Exercises Nebula Level02

Note the lack of filter when the environment variable is used. Usually it contains the current user login but let’s check her content:

Exploit Exercises Nebula Level02

Since environment variable can be easily altered, we can use it to call getflag:

Exploit Exercises Nebula Level02

Or anything else :

Exploit Exercises Nebula Level02

My way to go

## Project* Find Amazon s3 buckets: `s3-buckets-bruteforce /opt/SecLists/mine/s3-buckets.txt -` if found: `s3-buckets-extractor ` * Ex...… Continue reading

« Browser extensions

Published on January 14, 2015

Exploit Exercices, Nebula - level01 »

Published on January 13, 2015