Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > DON’T LET THE GRINCH STEAL CHRISTMAS
    Top Stories

    DON’T LET THE GRINCH STEAL CHRISTMAS

    DON’T LET THE GRINCH STEAL CHRISTMAS

    Published by Gbaf News

    Posted on December 17, 2014

    Featured image for article about Top Stories

    Since we are in the thick of the holiday season, we are analyzingwhich operating systems support the needs of e-commerce and brick and mortar retail shops. Due to the lower cost of ownership and efficiencies such as a non-resource heavy operating system that allow for applications to run more smoothly, we found that Linux is dominating when it comes to e-commerce site deployment.

    According to a 2013 report from W3Tech, approximately 65% of all web servers on the Internet utilize a Unix/Linux based operating system.[i]We uncovered a bug that impacts all Linux platforms, including mobile devices, and we’re calling it“grinch.” Fortunately, there are ways to detect the exploit of this bug in your environment until a patch is released.

    A Change in the Landscape

    In August of this year, we released a blog that details the exploitation of the new logging system (JournalD) to hijack terminal sessions for remote execute commands.

    We dove further into the Linux platform and discovered grinch, which exists in the new authorization system that allows privilege escalation through wheel.

    Wheel is a special user group that controls access to the su command, which allows a user to masquerade as another user.  When a Linux system is built, the default user is assigned to the wheel group that allows for administrative task execution within the system. For example, if the file is owned by user XYZ and group wheel, it will run as XYZ:wheel, no matter who executes the file.

    New Linux ecosystems attempt to implement new methods of authentication and authorization to remove a large assortment of vulnerability vectors introduced with random setuid binaries.While we can look at capabilities as a part of the cure, Policy Kit (Polkit) is one of the main drivers for straying away from setuid binaries. A simple ‘man polkit’ allows us to read deeply into the new authorization API for privileged programs.

    Background on Polkit

    Most privileged system operations are already controlled by Polkit, a well-established, fine-grained, and (possibly) network-transparent service for managing privileged operations by ordinary users.

    • Polkit can be used by privileged processes to decide if it should execute privileged operations on behalf of the requesting user.[ii]For directly executed tools, Polkit provides a setuid-root helper program called ‘’pkexec.’’The hooks to ask the user for authorizations are well integrated into text environmentsand native in all major graphical environments.
    • The concept of a console user(that usermode/consolehelper implements) is no longer a sufficient concept from which to derive privileges. OTOH Polkit authorizations can properly distinguish between multiple active sessions and seats: e.g. an untrusted user’s reboot request is only granted if only a single user session runs at that time.

    When talking about Polkit, we need to understand we are no longer dealing with a single daemon. Instead, we are dealing with a whole new authority management wrapped in a setuid root daemon that gives us access to new tools and ways of doing things. Each piece of this ecosystem exposes possible vulnerabilities through backend D-Bus implementation, the front end Polkit daemon, or even userland tools that use Polkit for privilege authorization.This ecosystem allows us to achieve local privilege escalation in the modern era.One set of tools is PackageKit.

    PackageKit

    PackageKit is a set of tools that allows an abstraction layer (over D-BUS) to work across package management systems and architectures. PackageKit attempts to make the management process easier to navigate in the face of a multitude of different package management ecosystems like APT, Yum, pacman, and others. PackageKit uses PolKit in the backend for user authentication. So, in Fedora, while DNF or Yum may not allow access to specific user(s) to install packages, PolKit rules are separate and may allow the action, which is something that will be addressed with PKCon. For now, only an understanding of the default rule layout is needed.

    PolKit Authorization Rules

    On a default setup, authorization rule files are kept in /etc/polkit-1/ and /usr/share/polkit-1/. These are sorted by the basename of the file (10- before 20-) and /etc/ will overrule /us/share/. With an ls -la on /etc/plkit-1/, we can see:

    ls -lah

    total 28K

    drwxr-xr-x.   5 root    root    4.0K Dec  6  2013 .

    drwxr-xr-x. 142 root    root     12K Nov 16 10:18 ..

    drwxr-x—.   7 root    polkitd 4.0K Dec 11  2013 localauthority

    drwxr-xr-x.   2 root    root    4.0K Aug  4  2013 localauthority.conf.d

    drwx——.   2 polkitd root    4.0K Oct  3 12:15 rules.d

    A couple of polkitd uid/gid permissions are seen, but mostly the permissions are root owned. Insidethese folders, the files are written in simple JavaScript to manage Polkit privileges. So, if we wanted to change these permissions outside of an arbitrary file write or other exploits, we would need root/polkitd privileges. Let’s take a look at one of these files in /etc/polkit-1/rules.d/50-default.rules:

    /* -*- mode: js; js-indent-level: 4; indent-tabs-mode: nil -*- */

    // DO NOT EDIT THIS FILE, it will be overwritten on update

    //

    // Default rules for polkit

    //

    // See the polkit(8) man page for more information

    // about configuring polkit.

    polkit.addAdminRule(function(action, subject) {

        return [“unix-group:wheel”];

    });

    Understanding this piece of the API is relatively straightforward. An admin rule is setup to declare that the PolKit admin is any user in the wheel group. Yes, users in wheel can run Sudo and wheel access is required when a user attempts to execute administrative tasks like changing time, adjusting user access, performing maintenance, or troubleshooting services. By abusing our group privileges,we no longer need the user’s password (or root when Sudo is not utilized).

    If we were to compromise the user through a client-side vulnerability or any privilege escalation on the box itself, we would no longer need to worry about cached Sudo authorization timestamp tokens or trying to trick users into providing their credentials with bashrc, environment modifications, or other means. Instead, we can abuse the user’s group privileges to give us access, thus granting direct authentication bypassven if the wheel user cannot get root like in Ubuntu ecosystems.

    Exploitation With PKCon

    So, we know that any user in the wheel group has “most” admin privileges. I say “most” because there are certain other checks taken into account when attemptingactions like adding new repository signatures. A user’s roledetermines the ability to install any package from an installed repo without authentication. This is done with a tool called PKCon (PackageKit Console Client). Let’s check that out.

    ]$ id

    uid=1000(blahman) gid=1000(blahman) groups=1000(blahman),10(wheel) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023

    ]$ Yum install cowsay

    Loaded plugins: auto-update-debuginfo, langpacks, refresh-packagekit

    You need to be root to perform this command.

    ]$ dnf install cowsay

    Dependencies resolved.

    Downloading Packages:

    cowsay-3.03-14.fc20.noarch.rpm                                                                                                                                                      89 kB/s |  26 kB     00:00

    Running transaction check

    Transaction check succeeded.

    Running transaction test

    Transaction test succeeded.

    Running transaction

    Error: Unable to initialize yumdb history: [Errno 13] Permission denied: ‘//var/lib/dnf’

    ]$ pkcon install cowsay

    Resolving                     [=========================]

    Querying                      [=========================]

    Testing changes               [=========================]

    Finished                      [=========================]

    Installing                    [=========================]

    Resolving dependencies        [=========================]

    Downloading packages          [=========================]

    Testing changes               [=========================]

    Installing packages           [=========================]

    Finished                      [=========================]

     ]$ cowsay got root?

     ______________

    < got root? >

     ———–

            \   ^__^

             \  (oo)\_______

                (__)\       )\/\

                    ||—-w |

                    ||     ||

    We couldn’t use Sudo for avariety of reasons (lack of permissions, password, etc.), Yumwas inaccessible because it requires root, and DNF wouldn’t work because of FS permission checks; however, PKcon worked flawlessly. In order to exploit this, all we need is a singlevulnerability in any package in a repo. There are tons to choose from. If we type ‘PKCon’ or simply ‘man PKCon,’ we can find a list of repos in use and then pull a list of all bins and version numbers. I won’t provide one here because you don’t want everything handed to you.

    Conclusion

    This simple logic will mostly affect home users who run on an account with wheel. This includes most people, as they need Sudo. Fixing the issue is as simple as managing PolKit authorization rules or properly managing group privileges for users.

    We find that possession of user logs and knowledge of your own environment are the best security content to help you navigate away from a bug like grinch. Know how your Linux administrator is installing packages and managing updates—do they use Yum to install packages? Firing on any of the newer methods like PKCon will be an immediate trigger of the exploit in use

    While this type of attack is certainly seen in corporate environments (everyone seems to need to have wheel for one reason or another), your success ratemay vary depending on target. There are all sorts of other fun techniques you can utilize with default Polkit rules, and I leave it to the reader todiscover more fun.

    [i]http://unix.stackexchange.com/questions/85308/whats-the-approximate-percentage-of-linux-servers-in-the-world

    [ii]http://fedoraproject.org/wiki/Features/UsermodeMigration

    Related Posts
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Top Stories

    Explore more articles in the Top Stories category

    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    View All Top Stories Posts
    Previous Top Stories PostREVISED CRITICAL ILLNESS DEFINITIONS
    Next Top Stories PostTHE DANGERS OF DRINK DRIVING THIS CHRISTMAS