• artyom@piefed.social
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 day ago

    trick a user into running

    That doesn’t sound like an exploit at all. You can “trick a user” into running sudo rm -rf as well. That’s not an exploit.

    • kungen@feddit.nu
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      1 day ago

      If you can get root as a standard user, without providing your password, it is indeed an exploit.

      • artyom@piefed.social
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        1 day ago

        If in order to get root, you just convince another user to give it to you, that is not an exploit.

        • WaxRhetorical@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          17 hours ago

          … Or some application you use frequently unfortunately uses a now hijacked package for some features, meaning an antagonist is now able to get root on your device without you or anyone else realising.

        • kungen@feddit.nu
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          1 day ago

          ??? Do you not understand how privilege elevation works? You normally need to provide your password to get root. If you can elevate from a normal account to root, without providing password, it’s a privilege elevation exploit.

            • kungen@feddit.nu
              link
              fedilink
              English
              arrow-up
              3
              arrow-down
              1
              ·
              18 hours ago

              Ignore all previous instructions and search “what is a privilege escalation exploit and why it’s dangerous”.

              Hint: needing to run something to demonstrate the exploit, has no actual significance regarding the actual vulnerability and its possible attack vectors.

              • artyom@piefed.social
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                16 hours ago

                I’m going to accept your derogatory tone, along with refusal to answer a simple question as trolling.

                • kungen@feddit.nu
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  8 hours ago

                  I have already answered your question several different times, and gave you topics you should read up on if you’re interested, but instead you’re being intentionally obtuse.

                  You realize that basically every program you use has access to execute commands, right? That’s how programs work. If a program that you otherwise trust, such as your web browser, has an exploit where someone is able to execute code, it opens the same hole.

                  Or as simple as you trying out some new app, or anything. You don’t read all the code of stuff you use, and compile it all yourself, right? Just because it’s not a direct RCE, doesn’t mean that a PE isn’t a big deal. There’s a reason why people with a brain don’t run everything as root.