A CVE Journey: From Crash to Local Privilege Escalation
- This post is a complete walkthrough for the process of writing an exploit for CVE 2019-18634. I will talk about the methodologies used and why is it such a good bug to begin your real world exploitation skills.
- This bug allows for Local Privilege Escalation because of a BSS based overflow, which allows for the overwrite of user_details struct with uid 0, essentially escalating your privilege. This bug can be triggered even by users not listed in the sudoers file
- There is no impact unless pwfeedback has been enabled.
Prelude
My journey started with a member in the OpenToAll slack group posting a link for some CVE advisory. Going through the advisory highlights some of the points which made me think I can use this bug for my first CVE POC.
a user may be able to trigger a stack-based buffer overflow
versions 1.7.1 to 1.8.30 inclusive are affected
Exploiting the bug does not require sudo permissions
the stack overflow may allow unprivileged users to escalate to the root account
All of these make this bug a very lucarative option for a newbie to start, and since this is just a stack based buffer overflow, I decided to give it a try.
Setup
To not ruin my default Linux installation, I decided to reproduce the bug in a docker container. It would be lighter than a full blown VM and I won’t have to worry about the installation ruining something if it goes wrong. 80% of the Dockerfile has been copied from grazfather’s Pwndock. My addition to it is the automatic build script to deploy the sudo version I needed to test. sudouser
for the user which has sudo privileges, and testuser
for the user without sudo privileges.
Dockerfile
build.sh
Note the pwfeedback
in /etc/sudoers, need to set it to reach the codepath for the vulnerability.
Crash
For sudo versions prior to 1.8.26, and on systems with uni-directional pipes,
reproducing the bug is simpler. Here, the terminal kill character is set to the
NUL character (0x00) since sudo is not reading from a terminal. This method is
not effective in newer versions of sudo due to a change in EOF handling introduced
in 1.8.26.
I decided to give the 1.8.25p1 version a try. After setting up my docker, I decided to reproduce the crash with the payload given in the advisory. The crash happened as expected.
perl -e 'print(("A" x 100 . chr(0)) x 50)' | sudo -S -k id
Password: Segmentation fault (core dumped)
Its time to get to the root of the bug (pun intended)
Debugging
sudo is a suid
binary
You cannot just run a sudo command from a non privileged user and attach the debugger to it. The debugger needs to run as root and now when sudo is triggered as a non privileged user, the debugger can attach to it given its pid.
Let’s start by setting up a pwntools script to run sudo and give input to it
Running this pauses the script, giving us time to attach the debugger
Once attached, continue the execution in gdb and press any key to continue the python script.
You can see the result below
At 00:21, we get a segmentation fault in the debugger and we have the complete stack trace to see how we reached this point. This will come very handy while analysing the bug.
Analysis of the Bug
First a very important line from the advisory
The bug can be reproduced by passing a large input with embedded terminal
kill characters to sudo from a pseudo-terminal that cannot be written to
The phrase ‘from a pseudo-terminal that cannot be written to’ is very important as without that specific condition, the bug cannot be triggered, so first let’s focus on that part. We will look at the code to understand how the bug manifests.
Remember from the stack trace, the function which crashes is getln, so lets find that first.
A very good technique to find bits in complete source directory is the grep trick, which can list the files containing a string.
Ignoring the config lines and some calling lines, we can guess tgetpass.c:308 is our candidate
Let’s analyse the bug
Basically what the function does is, copies buf and bufsiz to new values, cp and left respectively, I am guessing, cp means current pointer. Then it starts looping while there is still space left in the buffer. It uses a read call to read one byte from the file descriptor, and analyses the character received. If it is a new line or carriage return or if no character was read, the loop will break and the password is returned to the caller.
Note the line if(feedback), in that check, if the feedback is enabled then a ‘*’ needs to be printed on the fd(pty) for every character entered, and if the delete button is pressed, the * needs to be removed. To remove the asterisk ‘\b’ or backspace is written to the fd and this deletes the asterisk.
Can you spot the bug?
If the write fails, the loop breaks and the left is set to bufsize, but cp is not reset back to the original position.
Hence it very important to have the write fail, if the write doesn’t fail the bug will never trigger. This answers the cannot be written to part, but what about the pseudo-terminal, why is that needed? To understand that we need to focus on the line if (c == sudo_term_kill), and see where this sudo_term_kill character comes from. Using the same grep trick, we see the following
sudo_term_kill = term.c_cc[VKILL], looking at the reference for VKILL, we understand that it is something set by termios. sudo uses termios to setup echo/no echo for the password and probably for variety of other things. Using a pty or pseudo-terminal is important because we need null bytes to exploit the bug. If we don’t use a pty, VKILL is set to '\0', making exploitaton impossible.
Let’s now write the relevant code which uses a pty and can also make the write fail
We first open a pty with os.openpty(), then we get the name of the fd, and open it in readonly mode, we now pass this fd to the program as the stdin, since the fd was opened in readonly, the write will always fail, we can write to mfd and that data would be sent over to fd, but nothing written to fd would be sent back. So no password prompt now :). We also change the character from “\x00” to “\x15” because null byte now won’t crash the sudo binary.
Now that we have reproduced the POC with the right control character ('\x15') and also can debug it correctly, let’s move on to exploitation.
Exploitation
Runing checksec on the binary
Looking at this might scare you away from trying to exploit sudo, but let’s focus on the primitives we have. We have a bss overflow and no RIP control, so let’s get creative.
Initially before the exploitation, while looking at the help of sudo, I noticed the askpass option
man sudo describes askpass as
Normally, if sudo requires a password, it will read it from
the user's terminal. If the -A (askpass) option is speci‐
fied, a (possibly graphical) helper program is executed to
read the user's password and output the password to the stan‐
dard output. If the SUDO_ASKPASS environment variable is
set, it specifies the path to the helper program. Otherwise,
if sudo.conf(5) contains a line specifying the askpass pro‐
gram, that value will be used. For example:
# Path to askpass helper program
Path askpass /usr/X11R6/bin/ssh-askpass
If no askpass program is available, sudo will exit with an
error.
Okay, so sudo can execute a user defined program, but at what privileges? Let’s look for the code reference for this askpass
grep reveals sudo_askpass as: (I have not included the unnecessary code from the top and bottom)
Note the line setuid(user_details.uid), our program will be executed with our privileges, but if we manage to set the user_details.uid to 0, our program might run as root. So where does this user_details structure lies? Let’s look at gdb. We set a breakpoint at tgetpass.c:333, and start our python program. Attaching to the debugger and continuing the python program immediately hits the breakpoint.
Our user_details struct lies 576 bytes ahead of the buffer position, very well, we can very easily change its uid to 0, but how do we make the program follow this path? We cannnot just start sudo with -A flag as the overflow lies in the input prompt. We need to find the code which dictates the path of the program.
sudo_askpass is being called in tgetpass.c line 117
If TGP_ASKPASS is set the program takes the execution path and flags is passed as a parameter to tgetpass. Looking at the backtrace, tgetpass was called by sudo_conversation in conversation.c line 72.
We can now use gdb to switch frames and find the location of tgetpass_flags
tgetpass_flags lies 548 bytes ahead of the buffer, so we can overwrite the flags too.
We now have our exploit path ready
- Move the pointer ahead by 548 bytes, by abusing the buffer overflow
- SET TGP_ASKPASS flag
- Again move the pointer ahead till we reach user_details struct
- Set UID to 0
At this stage, we just can start the program with SUDO_ASKPASS environment variable set to the program we want to execute and it should all play out perfectly.
When I was filling the buffer, I used the character A to fill the buffer and my program kept crashing because of SIGILL. I was very sure there cannot be a SIGILL because of the type of vulnerability, looking around the code, I spotted, a signo buffer which handled all the signals sudo received and it resent it back to itself. This is why I kept getting a SIGILL. After switching from character A to null byte my root shell popped.
Let’s finish writing the code for the python exploit
We first create the program to be run by askpass, I will be using a reverse shell which connects to out listener on port 4444
rs.sh
We then start a server at port 4444
We fill the buffer with 548 0s and then set the flags
We then fill it with 20 more 0s to reach the user_details struct
We then fill the userdetails struct with the right details, but set uid with three null chars as the \n is replaced by \0 by the getln function, making the uid 0
exploit.py
Result
Conclusion
The exploit can work very easily for versions >=1.8.26 as the eof handler in newer version will only handle the 0x4 or EOF character, not using that character anywhere will lead to a flawless execution of the exploit.
This was a very good learning opportunity for me and I would like to thank @vakzz for helping me deal with the write fails, I initially couldn’t understand how to make the write fail and that was super frustrating but nonetheless a learning experience.
In my opinion, this is a very good vulnerability to start with real world binaries as the complete source code is available and doesn’t require weird pointer manipulations and other stack setup to get a shell, the win function is already present and all you need to do is guide the program to towards it and overflow some bits. It also teaches a lot about terminals, pty, the special characters and ends up being super fun to exploit.
You can find the complete code on my github
Right now it only works for version 1.8.25 but only the offsets need to be changed to put it to use for other versions.
Feel free to ping me on twitter or disqus here for any questions.