[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

sudo: arbitrary file write with privileges of the RunAs user

Deprecated
ID: oval:org.secpod.oval:def:86995Date: (C)2023-01-19   (M)2024-02-06
Class: VULNERABILITYFamily: unix




In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9
Product:
sudo
Reference:
CVE-2023-22809
CVE    1
CVE-2023-22809
CPE    4
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/a:todd_miller:sudo
cpe:/o:redhat:enterprise_linux:9
...

© SecPod Technologies