vendor:
sudo
by:
n3m1.sys
7.8
CVSS
HIGH
Privilege Escalation
269
CWE
Product Name: sudo
Affected Version From: 1.8.2000
Affected Version To: 1.9.12p1
Patch Exists: YES
Related CWE: CVE-2023-22809
CPE: a:sudo:sudo
Metasploit:
https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp11-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp10-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2023-22809/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2023-22809/
Platforms Tested: Ubuntu Server 22.04
2023
sudo 1.8.0 to 1.9.12p1 – Privilege Escalation
Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine. The exploit checks if the current user has privileges to run sudoedit or sudo -e on a file as root. If so it will open the sudoers file for the attacker to add a line to gain privileges on all the files and get a root shell.
Mitigation:
Ensure that users are not given sudo privileges to edit or run files as root.