Firejail


Firejail has been a pain since the foothold. At the later stage, I discovered that the binary actually had SUID bit set

important thing is that the permission bit is set to root :jailer

The only user that is present inside the jailer group is the atlas user Now that I have made the lateral movement to the atlas user without being bound by the Firejail’s sandbox environment, I can finally get to the enumeration

atlas@sandworm:~$ /usr/local/bin/firejail --version
firejail version 0.9.68
 
compile time support:
	- always force nonewprivs support is disabled
	- AppArmor support is disabled
	- AppImage support is enabled
	- chroot support is enabled
	- D-BUS proxy support is enabled
	- file transfer support is enabled
	- firetunnel support is enabled
	- networking support is enabled
	- output logging is enabled
	- overlayfs support is disabled
	- private-home support is enabled
	- private-cache and tmpfs as user enabled
	- SELinux support is disabled
	- user namespace support is enabled
	- X11 sandboxing support is enabled

The installed instance is Firejail 0.9.68

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/sandworm]
└─$ searchsploit firejail
-------------------------------------------- ---------------------------------
 Exploit Title                              |  Path
-------------------------------------------- ---------------------------------
Firejail - Local Privilege Escalation       | linux/local/41022.md
[...REDACTED...]
-------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

One result shows up that matches the instance.

It dates back to Novemebr, 2016 This particuler exploit is likely outdated

Researching further into the subject, I came across an article published to seclists.org

Reading further into the article confirms that the target instance is highly likely to have this vulnerability; CVE-2022-31214 Moving on to the Privilege Escalation phase

more info can be found here