charles
Checking for sudo privileges of the charles
user after performing a manual enumeration
charles@pelican:/var/tmp$ sudo -l
Matching Defaults entries for charles on pelican:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User charles may run the following commands on pelican:
(ALL) NOPASSWD: /usr/bin/gcore
The charles
user is able to execute the /usr/bin/gcore
command as anyone without getting prompted for password
According to GTFOBins, the gcore binary can be abused for privilege escalation