Hi
Before submitting a PR I would like to hear your opinion.
Would it make sense to create a new function for wildcard / parameter injection possibilities?
This function would address all binaries which could be used to execute a function via a command line argument.
A well-known example is the tar command and the arguments --checkpoint-action=exec="chmod +s `which dash`" --checkpoint=1 as e.g. documented here: https://materials.rangeforce.com/tutorial/2019/11/08/Linux-PrivEsc-Wildcard/
I'm aware that this command execution method is already documented in GTFOBins, but it cannot be identified as wildcard or parameter injection. A new category would make sense for me to quickly identify binaries which can be abused for privesc if one or more parameters can be controlled.
What do you think?
THX
Hi
Before submitting a PR I would like to hear your opinion.
Would it make sense to create a new function for wildcard / parameter injection possibilities?
This function would address all binaries which could be used to execute a function via a command line argument.
A well-known example is the tar command and the arguments
--checkpoint-action=exec="chmod +s `which dash`" --checkpoint=1as e.g. documented here: https://materials.rangeforce.com/tutorial/2019/11/08/Linux-PrivEsc-Wildcard/I'm aware that this command execution method is already documented in GTFOBins, but it cannot be identified as wildcard or parameter injection. A new category would make sense for me to quickly identify binaries which can be abused for privesc if one or more parameters can be controlled.
What do you think?
THX