From 2036d0cf90b7cc4180ab2ab50e79852441979522 Mon Sep 17 00:00:00 2001 From: Andrea Cardaci Date: Thu, 24 May 2018 23:41:55 +0200 Subject: [PATCH] Warn about the -p option for suid* functions --- _data/functions.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_data/functions.yml b/_data/functions.yml index 4426ab9..abbc869 100644 --- a/_data/functions.yml +++ b/_data/functions.yml @@ -8,11 +8,11 @@ exec-non-interactive: suid-enabled: label: SUID - description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. + description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. The `-p` option may be useless or even wrong for certain distributions like Debian that runs in privileged mode by default. suid-limited: label: Limited SUID - description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems. + description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems (if that's the case don't use the `-p` option). sudo-enabled: label: Sudo