CVE-2019-0211: Proof of Concept for Apache Root Privilege Escalation Vulnerability Published
Researcher publishes proof of concept (PoC) for local root privilege escalation bug patched by Apache last week.
背景
Last week, Apache published a security update to address six vulnerabilities in HTTP Server versions 2.4.17 to 2.4.38. This release includes a fix for CVE-2019-0211, a local root privilege escalation vulnerability that could lead to arbitrary code execution.
分析
The vulnerability, dubbed CARPE (DIEM), exists in Apache Multi-Processing Modules (MPMs) such as mod_prefork, mod_worker and mod_event. Charles Fol, the researcher who discovered and named the vulnerability, targeted mod_prefork for his breakdown and subsequent PoC.
According to Fol, Apache uses a shared-memory area known as scoreboard to keep tabs on worker processes (lower privileges) managed by mod_prefork (root privileges). Exploitation of this vulnerability requires an attacker to gain read/write access to a worker process (through a separate exploit) in order to manipulate the scoreboard to point to a rogue worker before an Apache graceful restart is initiated by logrotate.
In their advisory, Apache noted that non-Unix systems are unaffected by CVE-2019-0211. This is likely due to the fact that the vulnerability is triggered by an Apache graceful restart (apache2ctl graceful), which is normally executed by logrotate every morning on *Nix systems.
Proof of Concept
Fol published his PoC to Github on April 8. In his blog, he notes this exploit is “between a POC and a proper exploit.” The expectation is now that the PoC is publicly available, it will most likely be refined further and ultimately leveraged by attackers in the wild. This is of great concern on shared hosting environments, where a malicious user could leverage this exploit to gain root access on the host and access files shared by other users on the host environment.
解决方案
CVE-2019-0211 is patched in Apache HTTP Server version 2.4.39. *Nix distributions including Ubuntu, Debian, and SuSE have package updates available for install. FreeBSD posted an advisory, but there is no security update available for it yet. Users are encouraged to install these updates as soon as possible.
Additionally, cPanel released a security update for EasyApache 4 that addresses this vulnerability.
识别受影响的系统
A list of Nessus plugins to identify these vulnerabilities will appear here as they’re released.
Nessus users scanning for vulnerable versions of Apache HTTP Server will see the following scan output.
Continuous monitoring via Nessus Network Monitor will result in the following output:
获取更多信息
- Apache Security Advisory
- Charles Fol's description of CARPE (DIEM)
- Ubuntu Security Advisory
- Debian Security Tracker for CVE-2019-0211
- SuSE: CVE-2019-0211
- FreeBSD: Apache -- Multiple vulnerabilities
- EasyApache 4 Apr 3 Release
加入 Tenable Community 中的 Tenable 安全响应团队
了解有关 Tenable 这款首创 Cyber Exposure 平台的更多信息,全面管理现代攻击面。
Get a free 60-day trial of Tenable.io Vulnerability Management.
相关文章
- Vulnerability Management