systemctl
Initially I discovered that the /bin/systemctl
binary has the SUID bit set, but then I also realized that I was unable to execute the binary while attempting to enumerated time-based processes (cron & systemd timers). It would just error out the permission being denied.
PEAS also has flagged it being a 95%+ privilege escalation vector
www-data@jarvis:/tmp$ ll /bin/systemctlll /bin/systemctl
172K -rwsr-x--- 1 root pepper 171K Feb 17 2019 /bin/systemctl
all these did not matter because i as the www-data
user, was unable to execute the binary in the first place as its ownership is set to root:pepper
Now that I have moved laterally to the pepper
user, I am able to execute the binary
systemctl
, by nature, is vulnerable to privilege escalation if it has the SUID bit set to any low privileged user
Unfortunately though, the commands above didn’t work. I will have to find a solution
This worked.
I will be exploiting this to escalate the privilege to root