Python3.10
An interesting system capability has been identified; /usr/bin/python3.10 cap_setuid=ep
This was enumerated by PEAS at a later stage as well
According to GTFObins, python with the
CAP_SETUID
capability can be abused for Privilege Escalation
It also has the
ep
capability assigned to it
Checking an online resource revealed that the ep
capability means that binary will run as root
Another resource revealed that
ep
stands for effective and permitted according to the official documentation
This effectively makes the binary SUID