Web: https://packetstormsecurity.com/files/171337/tomcat_rhel_based_temp_priv_esc.rb.txt

March 14, 2023, 2:39 p.m. |

Packet Storm packetstormsecurity.com

This Metasploit module exploits a vulnerability in RedHat based systems where improper file permissions are applied to /usr/lib/tmpfiles.d/tomcat.conf for Apache Tomcat versions before 7.0.54-8. The configuration files in tmpfiles.d are used by systemd-tmpfiles to manage temporary files including their creation. With this weak permission, you are able to inject commands into the systemd-tmpfiles service to write a cron job to execute a payload. systemd-tmpfiles is executed by default on boot on RedHat-based systems through systemd-tmpfiles-setup.service. Depending on the system in …

apache escalation privilege privilege escalation tomcat

Cyber Security Specialist

@ NielsenIQ | Algiers, Algeria

Chief Information Security Officer

@ Business Wire | United States

Sr. Red Team Engineer

@ Picus | Ankara, Turkey

Cyber Security Expert

@ AVIV Group | Paris, France

Security Architect

@ Eurofins | Barcelona, Poland

Engineering Manager, Cloud Security

@ Patreon | Remote

Sr. Cybersecurity Engineer - Identity and Access Management

@ Visa | Bengaluru, India

Research Engineer- Atmospheric Perils Vulnerability

@ Verisk | Boston, MA, United States

Security Engineer, SIRT

@ Amazon.com | Dublin, IRL

Sr Incident Response Analyst

@ ServiceNow | Dublin, Ireland

Security Architect

@ AVIV Group | Paris, France

Regulatory Compliance Specialist - ISMS

@ Intelerad | Remote, OR, United States