Sudo Misconfiguration
Overview¶
- One of the easiest and quickest privilege escalation techniques is to check if there is a vulnerable misconfiguration in the
/etc/sudoers
file. This file indicates what binaries can be ran with elevated privileges, meaning if specifically vulnerable binaries are allowed to be executed with sudo it could potentially result in privilege escalation.
Exploitation Example¶
-
For this method, the user's password must be known OR the user must have the
NOPASSWD
flag set in/etc/sudoers
.
# EVERYTHING ran but requires knowing the user's password root ALL=(ALL:ALL) ALL # EVERYTHING ran without a password user1 ALL=(ALL:ALL) NOPASSWD: ALL # SPECIFIC program doesn't require a password user2 ALL=(ALL:ALL) NOPASSWD: /usr/bin/vi
-
Check current sudo privileges and sudo-able programs that don't require passwords:
sudo -l
-
If any common binaries are specified, cross-reference https://gtfobins.github.io/#+sudo to see if there are any known exploits.
-
If
(ALL : ALL) ALL
is specified, you can escalate to the root user usingsudo su
if you know the current user's password.