activemq
Checking for sudo privileges of the activemq
account after conducting basic enumeration
activemq@broker:~$ sudo -l
matching defaults entries for activemq on broker:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
use_pty
user activemq may run the following commands on broker:
(all : ALL) NOPASSWD: /usr/sbin/nginx
The activemq
account is able to execute /usr/sbin/nginx
with the sudo
privileges without getting prompted for password
Configuring a user to run web server applications like nginx with sudo
is an extremely dangerous practice as it grants elevated privileges to the user, allowing adversary to fully compromise the target system