Binary Exploitation - Linux
Last updated
Last updated
SUID
whitelistSometimes SUID
commands may have a whitelist for commands .
This can be bypassed by using subcommands
:
In this example supershell
is the SUID
binary and /bin/ls
the whitelisted command, there are also another way to bypass this by using '
to open a quote:
Then in the next line use your desired command:
ShellSock
Attack vectors include remote command execution via CGI
scripts or web servers, as well as exploitation in environments like SSH
, HTTP
, and any process that involves Bash
interpreting environment variables.
Affects Bash
versions 1.x
to 4.3
:
Inject malicious code through the User-Agent
header, targeting a vulnerable CGI
script in the /cgi-bin/
directory to initiate a reverse shell: