2.5

CVE-2021-23239

Exploit

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Data is provided by the National Vulnerability Database (NVD)
Sudo ProjectSudo Version < 1.8.32
Sudo ProjectSudo Version >= 1.9.0 < 1.9.5
NetappCloud Backup Version-
NetappSolidfire Version-
FedoraprojectFedora Version32
FedoraprojectFedora Version33
DebianDebian Linux Version10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.09
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.5 1 1.4
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.