-
Let’s have a look at the exim binary that we found during our enumeration,when facing a binary we are not familiar with, we run it to see what it does.
/usr/sbin/exim-4.84-3 --help
-
Here we can see the binary does have sort of help menu, which means it is not a simple “in-house” custom binary. This tells us that Exim is a Mail Transfer Agent,This is interesting and may be listed on GTFOBins, so this one we will check.
https://gtfobins.github.io/
NOTE: We did not find the Exim binary listed on GTFOBins.
-
We need to determine the version of the binary to search for any public exploits available
/usr/sbin/exim-4.84-3 --version
-
We were able to extract the version of exim 4.84 Now, we can search on searchsploit to see if there are any public exploits available for this version.
searchsploit exim 4.84
-
Let's Download the exploit, then transfer it to the target system to gain elevated privileges.
searchsploit -m linux/local/39535.sh