charles


Checking for sudo privileges of the charles user after performing a manual enumeration

charles@pelican:/var/tmp$ sudo -l
Matching Defaults entries for charles on pelican:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
 
User charles may run the following commands on pelican:
    (ALL) NOPASSWD: /usr/bin/gcore

The charles user is able to execute the /usr/bin/gcore command as anyone without getting prompted for password

According to GTFOBins, the gcore binary can be abused for privilege escalation