7.8

CVE-2023-22809

Exploit

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

Data is provided by the National Vulnerability Database (NVD)
Sudo ProjectSudo Version >= 1.8.0 < 1.9.12
Sudo ProjectSudo Version1.9.12 Update-
Sudo ProjectSudo Version1.9.12 Updatep1
DebianDebian Linux Version10.0
DebianDebian Linux Version11.0
FedoraprojectFedora Version36
FedoraprojectFedora Version37
ApplemacOS Version < 13.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 50.16% 0.978
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

http://seclists.org/fulldisclosure/2023/Aug/21
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2023/01/19/1
Third Party Advisory
Exploit
Mailing List
https://www.sudo.ws/security/advisories/sudoedit_any/
Vendor Advisory
Exploit
Mitigation
https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
Third Party Advisory
Exploit
Mitigation
Technical Description