This executable can write data to local files.
This function can be performed by any unprivileged user.
echo DATA | cp /dev/stdin /path/to/output-file
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
echo DATA | cp /dev/stdin /path/to/output-file
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
echo DATA | cp /dev/stdin /path/to/output-file
This executable can read data from local files.
This function can be performed by any unprivileged user.
cp /path/to/input-file /dev/stdout
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
cp /path/to/input-file /dev/stdout
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
cp /path/to/input-file /dev/stdout
This executable provides a mechanism for privilege escalation by indirectly enabling elevated privileges, such as setting the SUID bit or modifying the ownership of another executable.
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
cp /path/to/input-file /path/to/output-file
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
cp /path/to/input-file /path/to/output-file
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
cp --attributes-only --preserve=all /path/to/input-file /path/to/output-file
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
cp --attributes-only --preserve=all /path/to/input-file /path/to/output-file