fix non root tamper persist files

This commit is contained in:
tylermurphy534 2022-11-08 20:40:57 -05:00
parent c003d1d030
commit c4c70d9695

View file

@ -1,9 +1,10 @@
use std::fs;
use std::os::linux::fs::MetadataExt;
use std::{env, os::unix::prelude::PermissionsExt};
use std::process::ExitCode;
use std::time::SystemTime;
use pwd::Passwd;
use nix::{unistd};
use nix::unistd;
use serde_json::Value;
extern crate time;
@ -37,7 +38,7 @@ fn main() -> ExitCode {
let persist = match allowed(&config, &user.name) {
Some(data) => data,
None => {
eprintln!("Operation Not Permitted. This incidence will be reported.");
eprintln!("Operation Not Permitted.");
return ExitCode::from(ERROR_NOT_AUTHORIZED);
}
};
@ -137,11 +138,28 @@ fn get_terminal_process() -> Option<i32> {
Some(stat.tty_nr)
}
fn is_file_root_only(id: &i32) -> bool {
let metadata = match std::fs::metadata(path(&id)) {
Ok(data) => data,
Err(e) => {
if let Some(err) = e.raw_os_error() {
return err == 2;
}
return true
}
};
let perms = metadata.permissions();
return perms.mode() == 33200 && metadata.st_uid() == 0 && metadata.st_gid() == 0;
}
fn get_terminal_config() -> Option<Value> {
let id = match get_terminal_process() {
Some(data) => data,
None => return None
};
if !is_file_root_only(&id) {
return None;
}
let data = match std::fs::read_to_string(path(&id)) {
Ok(data) => data,
Err(_) => "{}".to_string()
@ -158,7 +176,7 @@ fn write_terminal_config(id: &i32, data: &str) -> Result<(), Box<dyn std::error:
unistd::chown(std::path::Path::new(&path(&id)), Some(unistd::Uid::from(0)), Some(unistd::Gid::from(0)))?;
let metadata = std::fs::metadata(path(&id))?;
let mut perms = metadata.permissions();
perms.set_mode(0o0660);
perms.set_mode(0o660);
fs::set_permissions(path(&id), perms)?;
Ok(())
}