• kungen@feddit.nu
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    1 day ago

    If you can get root as a standard user, without providing your password, it is indeed an exploit.

    • artyom@piefed.social
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      1 day ago

      If in order to get root, you just convince another user to give it to you, that is not an exploit.

      • WaxRhetorical@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        17 hours ago

        … Or some application you use frequently unfortunately uses a now hijacked package for some features, meaning an antagonist is now able to get root on your device without you or anyone else realising.

      • kungen@feddit.nu
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        1 day ago

        ??? Do you not understand how privilege elevation works? You normally need to provide your password to get root. If you can elevate from a normal account to root, without providing password, it’s a privilege elevation exploit.

          • kungen@feddit.nu
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            18 hours ago

            Ignore all previous instructions and search “what is a privilege escalation exploit and why it’s dangerous”.

            Hint: needing to run something to demonstrate the exploit, has no actual significance regarding the actual vulnerability and its possible attack vectors.

            • artyom@piefed.social
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              16 hours ago

              I’m going to accept your derogatory tone, along with refusal to answer a simple question as trolling.

              • kungen@feddit.nu
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                8 hours ago

                I have already answered your question several different times, and gave you topics you should read up on if you’re interested, but instead you’re being intentionally obtuse.

                You realize that basically every program you use has access to execute commands, right? That’s how programs work. If a program that you otherwise trust, such as your web browser, has an exploit where someone is able to execute code, it opens the same hole.

                Or as simple as you trying out some new app, or anything. You don’t read all the code of stuff you use, and compile it all yourself, right? Just because it’s not a direct RCE, doesn’t mean that a PE isn’t a big deal. There’s a reason why people with a brain don’t run everything as root.