-
Notifications
You must be signed in to change notification settings - Fork 94
Open
Labels
PRPPatch Reward Program: This label is added to all PRP related issues for easy filteringPatch Reward Program: This label is added to all PRP related issues for easy filteringPRP:AcceptedPatch Reward Program: This issue has been accepted as a PRP entry.Patch Reward Program: This issue has been accepted as a PRP entry.
Description
-
Identifier of the vulnerability:
None -
Affected software:
- Linux: Cron daemons (
cronie,dcron,fcron) - Windows: Task Scheduler (
C:\Windows\System32\Tasks\) - macOS:
launchd(LaunchDaemons/LaunchAgents), legacy cron
- Linux: Cron daemons (
-
Type of vulnerability: Privilege Escalation / Configuration Security
-
Implementation approach:
- Linux: Parse
/etc/crontab,/etc/cron.d/*,/etc/cron.*/*,/var/spool/cron/*for jobs running asrootthat reference scripts with overly permissive permissions or world-writable paths. - Windows: Parse XML task definitions in
C:\Windows\System32\Tasks\and check<Command>targets. Flag tasks running asSYSTEM/Administrator that call binaries/scripts in writable directories. - macOS: Parse plist files in
/System/Library/LaunchDaemons/,/Library/LaunchDaemons/,/Library/LaunchAgents/, and~/Library/LaunchAgents/. Flag daemons/agents running asrootor privileged users with executables in insecure paths. Legacy cron tabs (/usr/lib/cron/tabs/*) can be scanned similarly to Linux.
- Linux: Parse
-
Resources:
Metadata
Metadata
Assignees
Labels
PRPPatch Reward Program: This label is added to all PRP related issues for easy filteringPatch Reward Program: This label is added to all PRP related issues for easy filteringPRP:AcceptedPatch Reward Program: This issue has been accepted as a PRP entry.Patch Reward Program: This issue has been accepted as a PRP entry.