activemq


Checking for sudo privileges of the activemq account after conducting basic enumeration

activemq@broker:~$ sudo -l
matching defaults entries for activemq on broker:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
    use_pty
 
user activemq may run the following commands on broker:
    (all : ALL) NOPASSWD: /usr/sbin/nginx

The activemq account is able to execute /usr/sbin/nginx with the sudo privileges without getting prompted for password

Configuring a user to run web server applications like nginx with sudo is an extremely dangerous practice as it grants elevated privileges to the user, allowing adversary to fully compromise the target system