Path exploits
Attack tree
1 Become root on Linux
1.1 Search for files with incorrectly installed authorities that are on PATH (OR)
1.2 Change PATH
1.3 Use script or program
Example
What folders are located under
$PATH
?
$ echo $PATH
Does current user have
write
privileges for any of these folders?
find / -writable 2>/dev/null | cut -d "/" -f 2,3 | grep -v proc | sort
Can
$PATH
be modified?Is there a script/application that will be affected by this vulnerability?
Notes
Not really exploit usage, but based on files with incorrectly installed authorities.