As far as I know, pkexec doesn't validate arguments, so it might not be
ideal if you are worried about people trying to trick it.

On Sat, Dec 15, 2018 at 6:15 AM JungHwan Kang <ultrac...@gmail.com> wrote:

> Sometimes, I use a sudo command with -s options for keeping
> environment variables for users account(sudoer). I also know -s option
> runs the shell specified by the SHELL environment variable. But the
> SHELL environment variable can be manipulated by other users having
> the same privilege.
>
> So, I think an adversary is able to abuse the changing SHELL
> environment variable for privilege escalation like a video below. (I
> assume the adversary owned the permission for executing a shell on a
> remote)
>
> https://youtu.be/JSQjIm7377o (unlisted state)
>
> I know it is uncertain when the sudo is executed with -s option by sudoer.
>
> Anyway, I have thought of the solutions to the issue below.
>  - using a pkexec of a Policy kit,
>  - disable a ptrace function via kernel.yama.ptrace_scope, CAP_SYS_PTRACE.
>
> Could you give some advice and comments?
>
> Thx.
>
>

Reply via email to