跳转到帖子

Oracle Linux: CVE-2023-22809: ELSA-2023-0291: sudo security update (IMPORTANT) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2023-22809: ELSA-2023-0291:sudo security update (IMPORTANT) (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
01/18/2023
Created
01/25/2023
Added
01/24/2023
Modified
01/07/2025

Description

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. A vulnerability was found in sudo. Exposure in how sudoedit handles user-provided environment variables leads to arbitrary file writing with privileges of the RunAs user (usually root). The prerequisite for exploitation is that the current user must be authorized by the sudoers policy to edit a file using sudoedit.

Solution(s)

  • oracle-linux-upgrade-sudo
  • oracle-linux-upgrade-sudo-devel
  • oracle-linux-upgrade-sudo-python-plugin

References

  • https://attackerkb.com/topics/cve-2023-22809
  • CVE - 2023-22809
  • ELSA-2023-0291
  • ELSA-2023-12143
  • ELSA-2023-0284
  • ELSA-2023-0282
  • 查看数 699
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…