Path exploits

Attack tree

1 Become root on Linux
    1.1 Search for files with incorrectly installed authorities that are on PATH (OR)
    1.2 Change PATH
    1.3 Use script or program


  1. What folders are located under $PATH?

$ echo $PATH
  1. Does current user have write privileges for any of these folders?

find / -writable 2>/dev/null | cut -d "/" -f 2,3 | grep -v proc | sort
  1. Can $PATH be modified?

  2. Is there a script/application that will be affected by this vulnerability?


Not really exploit usage, but based on files with incorrectly installed authorities.