Skip to content

Commit

Permalink
Update readme.md
Browse files Browse the repository at this point in the history
  • Loading branch information
passtheticket authored Apr 6, 2021
1 parent b4e66ca commit 63f37e1
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions privilege-escalation/litespeed/readme.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
# Openlitespeed Web Server 1.7.8 - Privilege Escalation (CVE-2021-26758)

OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system.
The "path" parameter has command injection vulnerability that leads to escalate privilege.
OpenLiteSpeed (1.7.8) web server runs with user(nobody):group(nogroup) privilege. However, extUser and
extGroup parameters could be used to join a group (GID) such as shadow, sudo, etc.


# Description
I found a way to escalate privileges on Ubuntu 18.04 via OpenLiteSpeed web server that runs with *user(nobody):group(nogroup)* privilege . According to this vulnerability , system user that has admin panel credentials can add himself to sudo group or shadow group( to read /etc/shadow file) . So that the user can execute command with high privileges.

Expand Down

0 comments on commit 63f37e1

Please sign in to comment.