zabbix
Checking for sudo privileges of the zabbix
user after making the lateral movement
zabbix@zab:/$ sudo -l
Matching Defaults entries for zabbix on zab:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
use_pty
User zabbix may run the following commands on zab:
(ALL : ALL) NOPASSWD: /usr/bin/rsync
The zabbix
user is able to execute the /usr/bin/rsync
command as anyone without getting prompted for password
rsync
According to GTFObins, rsync can be leveraged for privilege escalation