[LINPEAS] Add privilege escalation check: HTB Store — URL‑encoded traversal + stat... #515
      
        
          +141
        
        
          −0
        
        
          
        
      
    
  
  Add this suggestion to a batch that can be applied as a single commit.
  This suggestion is invalid because no changes were made to the code.
  Suggestions cannot be applied while the pull request is closed.
  Suggestions cannot be applied while viewing a subset of changes.
  Only one suggestion per line can be applied in a batch.
  Add this suggestion to a batch that can be applied as a single commit.
  Applying suggestions on deleted lines is not supported.
  You must change the existing code in this line in order to create a valid suggestion.
  Outdated suggestions cannot be applied.
  This suggestion has been applied or marked resolved.
  Suggestions cannot be applied from pending reviews.
  Suggestions cannot be applied on multi-line comments.
  Suggestions cannot be applied while the pull request is queued to merge.
  Suggestion cannot be applied right now. Please check back later.
  
    
  
    
🔧 Automated Privilege Escalation Check Addition
🤔 Privilege Escalation Reasoning
The post describes two generic, real‑world misconfigurations that enable local privilege escalation: (1) a Node.js process started with the --inspect debugger bound to localhost (default 9229), which allows any local user to attach and execute arbitrary JS in the context of the process owner; and (2) Chrome/Chromium running as root with a remote debugging port exposed on localhost (commonly 9222), which grants powerful DevTools control that can be abused for code execution as root. Both are platform‑agnostic development/debug flags, not CTF‑specific custom apps or uncommon 3rd‑party software bugs, and are prevalent enough in real environments to warrant automated detection. These fit linpeas’ goal of flagging dangerous local services/misconfigurations leading to privilege escalation on Linux/macOS.
🤖 Implementation Details
PEASS linpeas agent completed successfully with 92 items. Agent Comment: Here’s what I did to implement this technique in linpeas, with code changes made directly in the repo at /tmp/hacktricks_update_58o_lvba/repo.
Step-by-step work
New module: PR_Debuggable_runtimes_exposure
What the module does:
Code added:
Why this is valuable and not redundant
Where it was added
How the detection works (summary)
Node.js V8 Inspector
Chrome/Chromium DevTools and ChromeDriver
What you’ll see at runtime
Notes on performance and compatibility
Final check results
If you want me to expand this further (e.g., add macOS variants with ps -axo and lsof on Darwin, or include an additional hint line when dangerous listeners belong to root/system users), just say the word.
🏗️ Builder Agent Response
LinPEAS build agent completed successfully with 54 items. Agent Comment: Here’s what I did and the outcome:
Actions
Diagnosed issues
Fixes applied
Verification
Status
This PR was automatically created by the HackTricks Feed Bot. Please review the implementation carefully and test thoroughly before merging.