Description
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
Problem types
CWE-269 Improper Privilege Management
Product status
* (semver)
Credits
HTP
References
raw.githubusercontent.com/...s/linux/local/kloxo_lxsuexec.rb
www.exploit-db.com/exploits/25406
web.archive.org/...p://roothackers.net/showthread.php?tid=92
raw.githubusercontent.com/...s/linux/local/kloxo_lxsuexec.rb
www.exploit-db.com/exploits/25406
web.archive.org/...p://roothackers.net/showthread.php?tid=92
kloxo.org/
github.com/KloxoNGCommunity/kloxo
www.vulncheck.com/advisories/kloxo-local-priv-esc