Files
CVEs-PoC/2012/CVE-2012-10022.md
T
2025-09-29 21:09:30 +02:00

20 lines
1.0 KiB
Markdown

### [CVE-2012-10022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10022)
![](https://img.shields.io/static/v1?label=Product&message=Kloxo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brightgreen)
### Description
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
### POC
#### Reference
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb
- https://www.exploit-db.com/exploits/25406
- https://www.vulncheck.com/advisories/kloxo-local-priv-esc
#### Github
No PoCs found on GitHub currently.