Re: Linux Local Privilege Escalation

2019-04-12 Thread konsolebox
On Sat, Apr 13, 2019, 5:56 AM Eli Schwartz wrote: > But that still isn't a bug in bash. It's more along the lines of a > social engineering exploit. > Kids. -- konsolebox >

Re: Linux Local Privilege Escalation

2019-04-12 Thread Eli Schwartz
On 4/12/19 5:56 PM, Vladimir Marek wrote: > It escapes me how changing your own $PATH makes another user execute > files in /tmp. And if someone has /tmp in $PATH moreover before anything > else (or . for that matter) he deserves it. Right? I assume the idea is to escalate write access to another

Re: Linux Local Privilege Escalation

2019-04-12 Thread Vladimir Marek
It escapes me how changing your own $PATH makes another user execute files in /tmp. And if someone has /tmp in $PATH moreover before anything else (or . for that matter) he deserves it. Right? -- Vlad > I written an exploit which allow to became root when a normal user use sudo. > The f

Re: Linux Local Privilege Escalation

2019-04-12 Thread Eli Schwartz
On 4/12/19 5:38 PM, bakzero wrote: > Hi, > I written an exploit which allow to became root when a normal user use sudo. > The following code add to the .bashrc configuration file the /tmp path. Then > when the user exec sudo he runs the fake one, giving you a root shell. Just > run it, when the

Linux Local Privilege Escalation

2019-04-12 Thread bakzero
Hi, I written an exploit which allow to became root when a normal user use sudo. The following code add to the .bashrc configuration file the /tmp path. Then when the user exec sudo he runs the fake one, giving you a root shell. Just run it, when the normal user will use sudo you will get a root