User:Dgeerts/DontLookAtMe

From Atlas Wiki
Jump to navigation Jump to search

Able to run arbitrary executables on Windows Terminal server

  • Type: Local arbitrary code execution
  • Status: Not fixed

Microsoft Windows' bootloader by default checks the header of the executable it is given, to determine whether it is an EXE, BAT or COM file, and automatically runs it as the proper type. The current configuration on the Nikhef Windows Terminal Server blocks the loading of arbitrary EXE and COM files, but not arbitrary BAT files. Thus, by renaming the file extension from EXE to BAT, this security feature is circumvented, and the executable executed.

PHP scripts on webserver run under 'web' account

  • Type: Local privilege escalation
  • Status: Fixed

Any PHP script run on the webserver (by, for example, dropping the scriptfile into the user's public_html directory) executes under the 'web' account. This allows users to escalate their privilege (if the 'web' account has more rights than the user's account).

PHP on webserver able to reach main filesystem

  • Type:
  • Status: Not fixed

The PHP installation running on the webserver is able to reach the main filesystem (at least the *nix side) without any problems. In fact, several directories are exposed to the web (by design). This allows PHP scripts to access the filesystem, and (if rights permit) even write to the filesystem.

PHP on webserver able to exec arbitrary executables

  • Type:
  • Status: Not fixed

Using PHP's built-in 'exec' command, a PHP script can run arbitrary executables on the webserver.