Can we please stop talking about that sudo bug? It only affects systems using an insane configuration (allow $command as anyone *but* root). I can't come up with any situation where that configuration makes any sense (vs e.g. "allow $command as any member of a given group).
-
-
To illustrate why this is a ridiculous idea and gives you root anyway even if sudo didn't have the bug: 'adm' is a member of 'disk' which can write to raw block devices, so you can just sudo to 'adm' instead of root and edit the sudoers file, or give suid to /bin/sh.
Show this thread -
So if there are people there who actually had the sample config in the vuln report, they are vulnerable to all hell and back *anyway*, and if they've been trying to play whack-a-mole by excluding all "root-equivalent" user accounts, that's a ridiculous idea and they'll miss one.
Show this thread
End of conversation
New conversation -
-
-
“I need a shell running as the postgres user, or the apache user, and the only tool I know how to use is modifying sudoers, apparently”
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I was able to get this to work when my sudoers only permitted a user to sudo to www-data. I didn’t need to permit ALL... unless I’m remembering incorrectly.
-
I bet your sudoers entry didn't do what you think it did, or there was another sudoers entry overriding. It definitely does not work for me.
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.