Podatność CVE-2023-22809


Publikacja: 2023-01-18

Opis:
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
High
sudo 1.9.12p1 Privilege Escalation
n3m1.sys
03.04.2023
Med.
Cisco ThousandEyes Enterprise Agent Virtual Appliance Arbitrary File Modification
Jim Becher
19.08.2023

Typ:

CWE-264

(Permissions, Privileges, and Access Controls)

 Referencje:
https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
https://www.sudo.ws/security/advisories/sudoedit_any/

Copyright 2024, cxsecurity.com

 

Back to Top