Firejail


The target container environment has firejail with SUID bit set Despite the fact that PEAS has flagged it as an unknown SUID binary, there’s been a few occasions where outdated firejail binary with SUID bit set had been used for privilege escalation.

www-data@icinga:~$ /usr/bin/firejail --version
firejail version 0.9.68rc1
 
compile time support:
	- always force nonewprivs support is disabled
	- AppArmor support is enabled
	- AppImage support is enabled
	- chroot support is enabled
	- D-BUS proxy support is enabled
	- file transfer support is enabled
	- firetunnel support is enabled
	- networking support is enabled
	- output logging is enabled
	- overlayfs support is disabled
	- private-home support is enabled
	- private-cache and tmpfs as user enabled
	- SELinux support is disabled
	- user namespace support is enabled
	- X11 sandboxing support is enabled

Checking the version information reveals that the installed instance is firejail version 0.9.68rc1

which is vulnerable; CVE-2022-31214 Moving on to [[Cerberus_Privilege_Escalation_Container#[CVE-2022-31214](https //nvd.nist.gov/vuln/detail/CVE-2022-31214)|Privilege Escalation]] phase