all InfoSec news
Code Execution with “apt update” in crontab | PrivEsc in Linux
System Weakness - Medium systemweakness.com
Well it’s funny how putting apt-update in the cron jobs can make things vulnerable. Because one might put it in good intention of updating the system to keep everythin new and fresh but an attacker can take advantage of this to execute malicious code.
The apt update command is executed with root privileges, which means that any scripts or commands executed before the apt update command in the crontab file will also be executed with root privileges. This can be …
apt attackers code code execution command cron cybersecurity jobs linux malicious privesc privilege escalation privileges root scripts system things update vulnerable