Under certain circumstances, notably the MySQL process running under root privileges, the service can be abused to conduct a privilege escalation.
Refer to the Linux - Priv Esc Methodology note for a detailed procedure to do so.
Linux - Priv Esc Methodology
Last updated 4 years ago