cassie
Checking for sudo privileges of the cassie
user after making the lateral movement
cassie@clue:~$ sudo -l
Matching Defaults entries for cassie on clue:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User cassie may run the following commands on clue:
(ALL) NOPASSWD: /usr/local/bin/cassandra-web
The cassie
user is able to execute the /usr/local/bin/cassandra-web
command as anyone without getting prompted for password
We have already established that the target’s cassandra-web instance is vulnerable to remote file read.
If I could start an instance as the root
account, I should be able to read any file on the target system by leveraging the vulnerability