Sudo ClamAV Privilege Escalation
Sudo clamscan command might be vulnerable to privilege escalation (PrivEsc).
Investigation
If we can execute “clamscan” command as root as below,
we can read sensitive files by applying the custom yara rule.
Exploitation
1. Create a Yara Rule
First off, check the location in which the yara file can be created.
For instance, assume we can create the yara file under /var/lib/clamav/. Create the yara rule in there. Assume we want to read /etc/shadow, so specify the string “root” because the /etc/shadow contains “root” user name.
2. Execute ClamScan
Now execute "clamscan" as root.
We can see /etc/shadow under /tmp/results.
Last updated