NFS (111-2049)
Network File System.
Port
111 TCP/UDP
NFS (rpcbind)
2049 TCP
NFS
Config File
/etc/exports
(LINK)
Interact
Search open directories.
Mounts an open directory that has been found.
Once finished, unmount the directory.
Attacks
Read File
You can read files without having permission by changing the UUID.
Shell with SUID binary
In /etc/exports
there is an option that if not set correctly can lead to this attack.
root_squash
: If the root user is used to access NFS shares, it will be changed to the user nfsnobody, which is an account with no privileges. All files created and uploaded by the root user will be owned by the nfsnobody user, which prevents an attacker from uploading binary files with the SUID bit set.no_root_squash
: Remote users connecting to the share as the local root user will be able to create files on the NFS server as the root user. This would allow the creation of malicious scripts/programs with the SUID bit set.
So the idea is to create with the ROOT user a binary that invokes a shell with SUID and load it on the victim host and then run it from the victim host.
Create the binary that invokes the shell.
Move the binary to the directory and set the SUID.
Move to the victim host and run the binary.
Last updated