• entwine@programming.dev
    link
    fedilink
    arrow-up
    6
    ·
    4 days ago

    Are there any real life scenarios where an untrusted user is allowed access to a machine with an unprivileged account? I know there are (or were?) some public shared machines where you can ssh in for fun, but those aren’t serious.

    I’m thinking maybe a POS system or kiosk running Linux, and there’s shell access? This could possibly also be useful for jailbreaking devices that ship with Linux, but are locked down… Maybe like a car infotainment system?

    • cm0002@europe.pubOP
      link
      fedilink
      arrow-up
      5
      ·
      4 days ago

      Pretty much all those examples, but the real danger is chaining this exploit with others

      Perhaps someone is sitting on a couple exploits to get them into a system, but only to an unprivileged user, this would be a great final act

    • Dumhuvud@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      In the Node.js world adding a dependency may lead to arbitrary code being executed.

      It’s bad enough on its own because a bad actor can steal SSH-keys this way, but combined with this exploit they will be able to install a rootkit and compromise your entire system.

    • nomad@infosec.pub
      link
      fedilink
      arrow-up
      1
      ·
      3 days ago

      Only every local file inclusion bug ever. Include shellcode, run as webserver privs, escalate locally.