Investigation
If we can execute “clamscan” command as root as below,
we can read sensitive files by applying the custom yara rule.
Exploitation
1. Create a Yara Rule
First off, check the location in which the yara file can be created.
For instance, assume we can create the yara file under /var/lib/clamav/.
Create the yara rule in there.
Assume we want to read /etc/shadow, so specify the string “root” because the /etc/shadow contains “root” user name.
2. Execute ClamScan
Now execute "clamscan" as root.
We can see /etc/shadow under /tmp/results.