Skip to content

Commit

Permalink
upgrade POC description
Browse files Browse the repository at this point in the history
  • Loading branch information
phith0n committed May 5, 2020
1 parent 68c0c43 commit 0abecf2
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 7 deletions.
2 changes: 1 addition & 1 deletion base/saltstack/2019.2.3/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ FROM python:3.7
RUN set -ex \
&& apt-get update \
&& apt-get install -y --no-install-recommends dumb-init openssh-server cron \
&& pip3 install --no-cache-dir salt==2019.2.3 pycryptodomex CherryPy pyOpenSSL \
&& pip3 install --no-cache-dir salt==2019.2.3 pycryptodomex CherryPy pyOpenSSL msgpack==0.6.2 \
&& rm -rf /var/lib/apt/lists/*

RUN set -ex \
Expand Down
Binary file modified saltstack/CVE-2020-11651/1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
8 changes: 3 additions & 5 deletions saltstack/CVE-2020-11651/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ docker-compose up -d

## 漏洞复现

本文档只复现CVE-2020-11651漏洞,也就是水平权限绕过,不涉及到后续利用过程
本文档复现CVE-2020-11651漏洞。

我们可以使用如下请求来执行`salt/master.py`中的`ClearFuncs:_prep_auth_info`方法:

Expand All @@ -36,8 +36,6 @@ docker-compose up -d

利用这个方法,可以获得目标的所有用户的key,利用这个key即可通过超级管理员权限执行一些后台功能,比如下发任务等。

参考[这个项目][1],编写一个简单的POC(暂不公开),读取目标root用户的key(第一行输出),再利用这个key来读取文件`/etc/passwd`
使用[这个POC](https://github.com/dozernz/cve-2020-11651),首先获取Key,再在master中执行`touch /tmp/success`

![](1.png)

[1]: https://github.com/rossengeorgiev/salt-security-backports
![](1.png)
2 changes: 1 addition & 1 deletion saltstack/CVE-2020-11652/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ msg = {
}
```

参考[这个项目][1],编写一个简单的POC(暂不公开),写入`/etc/cron.d/shell`,利用crontab执行任意命令:
参考[这个项目][1],编写一个简单的POC,写入`/etc/cron.d/shell`,利用crontab执行任意命令:

![](1.png)

Expand Down

0 comments on commit 0abecf2

Please sign in to comment.