Exploit/Advisories

Published on September 23rd, 2020 📆 | 5795 Views ⚑

0

GoogleCloudPlatform OSConfig Privilege Escalation


Text to Speech
Google's osconfig agent was vulnerable to local privilege escalation due to relying on a predictable path inside the /tmp directory. An unprivileged malicious process could abuse this flaw to win a race condition and take over the files managed by the high privileged agent process and thus execute arbitrary commands as the root user (full capabilities). Exploitation was possible only during an osconfig recipe being deployed.
Source link





Tagged with:



Comments are closed.