In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Apple(1 tweets) Linux(6 tweets) iOS(3 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 182 |
cvetrends.com | 49 |
medium.com | 15 |
seclists.org | 8 |
securityonline.info | 7 |
news.ycombinator.com | 6 |
security.sios.jp | 5 |
dev.to | 3 |
github.com | 3 |
www.sudo.ws | 3 |
www.synacktiv.com | 3 |
www.bleepingcomputer.com | 3 |
Name | URL |
---|---|
n3m1dotsys/CVE-2023-22809-sudoedit-privesc | https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc |
Live-Hack-CVE/CVE-2023-22809 | https://github.com/Live-Hack-CVE/CVE-2023-22809 |
Name | URL |
---|---|
n3m1dotsys/CVE-2023-22809-sudoedit-privesc | github.com |
Live-Hack-CVE/CVE-2023-22809 | github.com |