mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 14:30:07 +01:00
Add note about Debian Buster
Since Debian Buster, `sh` drops SUID privileges unless the `-p` option is passed, thus behaving like Ubuntu.
This commit is contained in:
parent
391d436fc5
commit
2a2d2f2e4a
@ -69,8 +69,9 @@ suid:
|
|||||||
description: |
|
description: |
|
||||||
It runs with the SUID bit set and may be exploited to access the file
|
It runs with the SUID bit set and may be exploited to access the file
|
||||||
system, escalate or maintain access with elevated privileges working as a
|
system, escalate or maintain access with elevated privileges working as a
|
||||||
SUID backdoor. If it is used to run `sh -p`, omit the `-p` argument on systems
|
SUID backdoor. If it is used to run `sh -p`, omit the `-p` argument on
|
||||||
like Debian that allow the default `sh` shell to run with SUID privileges.
|
systems like Debian (<= Stretch) that allow the default `sh` shell to run
|
||||||
|
with SUID privileges.
|
||||||
|
|
||||||
sudo:
|
sudo:
|
||||||
label: Sudo
|
label: Sudo
|
||||||
@ -90,5 +91,6 @@ limited-suid:
|
|||||||
description: |
|
description: |
|
||||||
It runs with the SUID bit set and may be exploited to access the file
|
It runs with the SUID bit set and may be exploited to access the file
|
||||||
system, escalate or maintain access with elevated privileges working as a
|
system, escalate or maintain access with elevated privileges working as a
|
||||||
SUID backdoor. If it is used to run commands it only works on systems
|
SUID backdoor. If it is used to run commands it only works on systems like
|
||||||
like Debian that allow the default `sh` shell to run with SUID privileges.
|
Debian (<= Stretch) that allow the default `sh` shell to run with SUID
|
||||||
|
privileges.
|
||||||
|
Loading…
Reference in New Issue
Block a user