跳转到帖子

Amazon Linux 2023: CVE-2023-22809: Important priority package update for sudo

recommended_posts

发布于
  • Members

Amazon Linux 2023: CVE-2023-22809: Important priority package update for sudo

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
01/18/2023
Created
02/14/2025
Added
02/14/2025
Modified
02/14/2025

Description

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. A vulnerability was found in sudo. Exposure in how sudoedit handles user-provided environment variables leads to arbitrary file writing with privileges of the RunAs user (usually root). The prerequisite for exploitation is that the current user must be authorized by the sudoers policy to edit a file using sudoedit.

Solution(s)

  • amazon-linux-2023-upgrade-sudo
  • amazon-linux-2023-upgrade-sudo-debuginfo
  • amazon-linux-2023-upgrade-sudo-debugsource
  • amazon-linux-2023-upgrade-sudo-devel
  • amazon-linux-2023-upgrade-sudo-logsrvd
  • amazon-linux-2023-upgrade-sudo-logsrvd-debuginfo
  • amazon-linux-2023-upgrade-sudo-python-plugin
  • amazon-linux-2023-upgrade-sudo-python-plugin-debuginfo

References

  • https://attackerkb.com/topics/cve-2023-22809
  • CVE - 2023-22809
  • https://alas.aws.amazon.com/AL2023/ALAS-2023-106.html
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…