logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-22809

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-22809

Description:
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
Last updated date:
11/17/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/21/2023
Reference url to background

https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc

Type:
exploit
Confidence:
HIGH
Date of publishing:
01/21/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/26/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/26/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/26/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
02/22/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
04/06/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
04/06/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
04/06/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
05/16/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/10/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy