Sudo ClamAV Privilege Escalation
Sudo clamscan command might be vulnerable to privilege escalation (PrivEsc).
If we can execute “clamscan” command as root as below,
we can read sensitive files by applying the custom yara rule.
First off, check the location in which the yara file can be created.
For instance, assume we can create the yara file under /var/lib/clamav/. Create the yara rule in there. Assume we want to read /etc/shadow, so specify the string “root” because the /etc/shadow contains “root” user name.
Now execute "clamscan" as root.
We can see /etc/shadow under /tmp/results.
Last updated