Last Modified: Jan. 31, 2023
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
Tweets last week: 18
Remaining steady
Yahoo results: 322000000
Strongly raising
Current EPSS Score: 0.0309
Remaining steady
Reddit Posts: 8
Remaining steady
Github Repos: 2
Remaining steady
Found exploits:
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 7.8
Exploitability Score:
1.8
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-269
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:* Part: a Vendor: sudo_project | Alle Schwachstellen für sudo_project | |
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* Part: a Vendor: sudo_project | Alle Schwachstellen für sudo_project | |
cpe:2.3:a:sudo_project:sudo:1.9.12:p1:*:*:*:*:*:* Part: a Vendor: sudo_project | Alle Schwachstellen für sudo_project |
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* Part: o Vendor: debian | Alle Schwachstellen für debian | |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* Part: o Vendor: debian | Alle Schwachstellen für debian |
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* Part: o Vendor: fedoraproject | Alle Schwachstellen für fedoraproject |
Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html
Reference:
added:
http://www.openwall.com/lists/oss-security/2023/01/19/1
Reference:
added:
https://www.debian.org/security/2023/dsa-5321
Reference:
added:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
cpe:2.3:a:sudo_project:sudo:1.9.12:p1:*:*:*:*:*:*
Reference:
added:
https://security.netapp.com/advisory/ntap-20230127-0015/
Configuration:
added:
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <set operator="or"> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:1.9.12:p1:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"/> </set> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <set operator="or"> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:sudo_project:sudo:1.9.12:p1:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"/> <prop key="operating_system" value="cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"/> </set> </set> <prop key="program_influence" value="input"/> </set>