Nov. 29, 2022, 10:15 a.m. | /u/dimitriye98

cybersecurity www.reddit.com

Suppose our hypothetical attacker manages to execute a script on a user who doesn't have admin on their local machine, but has sudo rights on a server. The script installs a malicious ssh wrapper somewhere, doesn't really matter where, and edits the `.env` file to insert it into the path. When the wrapper is run, it installs a similar exploit into the user's remote environment to hijack sudo. The server has effectively been pwned, without needing any form of privilege …

cybersecurity hijacking path serious threat threat vector

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US