From 2a2d2f2e4a5dc13cf9e7ec57e30044199762b60f Mon Sep 17 00:00:00 2001 From: Andrea Cardaci Date: Wed, 14 Aug 2019 17:54:19 +0200 Subject: [PATCH] Add note about Debian Buster Since Debian Buster, `sh` drops SUID privileges unless the `-p` option is passed, thus behaving like Ubuntu. --- _data/functions.yml | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/_data/functions.yml b/_data/functions.yml index e38449e..2c0ec9c 100644 --- a/_data/functions.yml +++ b/_data/functions.yml @@ -69,8 +69,9 @@ suid: description: | It runs with the SUID bit set and may be exploited to access the file system, escalate or maintain access with elevated privileges working as a - SUID backdoor. If it is used to run `sh -p`, omit the `-p` argument on systems - like Debian that allow the default `sh` shell to run with SUID privileges. + SUID backdoor. If it is used to run `sh -p`, omit the `-p` argument on + systems like Debian (<= Stretch) that allow the default `sh` shell to run + with SUID privileges. sudo: label: Sudo @@ -90,5 +91,6 @@ limited-suid: description: | It runs with the SUID bit set and may be exploited to access the file system, escalate or maintain access with elevated privileges working as a - SUID backdoor. If it is used to run commands it only works on systems - like Debian that allow the default `sh` shell to run with SUID privileges. + SUID backdoor. If it is used to run commands it only works on systems like + Debian (<= Stretch) that allow the default `sh` shell to run with SUID + privileges.