Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Nov 1, 2019
1 parent 294cbcf commit bf9a891
Showing 1 changed file with 40 additions and 0 deletions.
40 changes: 40 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -59910,6 +59910,46 @@
},
"needs_cleanup": true
},
"exploit_linux/local/omniresolve_suid_priv_esc": {
"name": "Micro Focus (HPE) Data Protector SUID Privilege Escalation",
"fullname": "exploit/linux/local/omniresolve_suid_priv_esc",
"aliases": [

],
"rank": 600,
"disclosure_date": "2019-09-13",
"type": "exploit",
"author": [
"s7u55"
],
"description": "This module exploits the trusted `$PATH` environment\n variable of the SUID binary `omniresolve` in\n Micro Focus (HPE) Data Protector A.10.40 and prior.\n\n The `omniresolve` executable calls the `oracleasm` binary using\n a relative path and the trusted environment `$PATH`, which allows\n an attacker to execute a custom binary with `root` privileges.\n\n This module has been successfully tested on:\n HPE Data Protector A.09.07: OMNIRESOLVE, internal build 110, built on Thu Aug 11 14:52:38 2016;\n Micro Focus Data Protector A.10.40: OMNIRESOLVE, internal build 118, built on Tue May 21 05:49:04 2019 on CentOS Linux release 7.6.1810 (Core)\n\n The vulnerability has been patched in:\n Micro Focus Data Protector A.10.40: OMNIRESOLVE, internal build 125, built on Mon Aug 19 19:22:20 2019",
"references": [
"CVE-2019-11660",
"URL-https://softwaresupport.softwaregrp.com/doc/KM03525630"
],
"platform": "Linux",
"arch": "x86, x64",
"rport": null,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"Micro Focus (HPE) Data Protector <= 10.40 build 118"
],
"mod_time": "2019-11-01 17:11:33 +0000",
"path": "/modules/exploits/linux/local/omniresolve_suid_priv_esc.rb",
"is_install_path": true,
"ref_name": "linux/local/omniresolve_suid_priv_esc",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
},
"needs_cleanup": true
},
"exploit_linux/local/overlayfs_priv_esc": {
"name": "Overlayfs Privilege Escalation",
"fullname": "exploit/linux/local/overlayfs_priv_esc",
Expand Down

0 comments on commit bf9a891

Please sign in to comment.