Python3.10


An interesting system capability has been identified; /usr/bin/python3.10 cap_setuid=ep This was enumerated by PEAS at a later stage as well

According to GTFObins, python with the CAP_SETUID capability can be abused for Privilege Escalation

It also has the ep capability assigned to it Checking an online resource revealed that the ep capability means that binary will run as root

Another resource revealed that ep stands for effective and permitted according to the official documentation This effectively makes the binary SUID