text
stringlengths
0
1.99k
thread in oss-security to discuss this with the community [12].
--[ 9 - Conclusion
This was a very hard exploit. It is still not reliable at all. I hope this
learning approach helps you become familiar with ProFTPd internals and
gives you some insights on vulnerability exploitation.
--[ 10 - References
[01] http://www.proftpd.org/docs/faq/linked/faq-ch1.html
[02] https://nvd.nist.gov/vuln/detail/CVE-2020-9273
[03] https://nvd.nist.gov/vuln/detail/CVE-2020-9272
[04] https://github.com/proftpd/proftpd/issues/903
[05] http://www.phreedom.org/research/exploits/proftpd-ascii/
[06] http://bugs.proftpd.org/show_bug.cgi?id=3521
[07] http://phrack.org/issues/67/7.html
[08] http://bugs.proftpd.org/show_bug.cgi?id=3536
[09] http://bugs.proftpd.org/show_bug.cgi?id=3711
[10] http://bugs.proftpd.org/show_bug.cgi?id=4169
[11] https://www.reddit.com/r/netsec/comments/323z0j/
proftpd_unauthenticated_copying_of_files_via_site/
[12] https://seclists.org/oss-sec/2021/q3/119
--[ 11 - Source code
Please find the exploit source code at
https://github.com/ptef/CVE-2020-9273/blob/main/exploit_proftpd.c
|=------------------------------------------------------------------------=|
|=-------=[ Mapping IOKit Methods Exposed to User Space on macOS ]=-------=|
|=------------------------------------------------------------------------=|
|=-----------------=[ Karol Mazurek (@karmaz95) of AFINE ]=---------------=|
|=------------------------------------------------------------------------=|
=================
--[ Table of contents
============================================================================
0 - Introduction
1 - IOKit Interface Fundamentals
1.0 - Introduction to IOKit
1.1 - Registry
1.1.1 - Planes
1.1.2 - Services
1.1.3 - Driver
1.1.4 - Matching
1.1.5 - IOKit Personalities
1.1.6 - Service Instances
1.2 - User Clients
1.2.1 - Multiple User Clients per Service
1.2.2 - External Methods
1.2.3 - Dispatch Mechanism
1.2.4 - getTargetAndMethodForIndex
1.2.5 - Access Control
1.3 - User Space App
1.3.1 - Service Discovery
1.3.2 - Spawning User Client
1.3.3 - Calling External Method
1.4 - User Space Application Flow
2 - IOKit Reconnaissance
2.0 - What to Map
2.1 - KEXT Analysis
2.1.1 - Bundle Names
2.1.2 - Driver Names
2.1.3 - NewUserClients
2.1.4 - UC Types
2.1.5 - External Methods
2.1.6 - Arguments
2.2 - Runtime Enumeration
2.2.1 - Service Discovery Automation
2.2.2 - Driver Hooking in Kernel Space
2.2.3 - Driver Hooking in User Space
2.2.4 - Corpus
2.2.5 - Tracer
2.3 - Map Verification
3 - Conclusion
4 - Acknowledgements
5 - References
============================================================================
============
--[ 0 - Introduction
============================================================================
IOKit is the core framework macOS uses for communication between user
space and the kernel, exposing numerous driver interfaces. Despite ongoing