#VU71332 Input validation error in Sudo - CVE-2023-22809

 

#VU71332 Input validation error in Sudo - CVE-2023-22809

Published: January 18, 2023 / Updated: October 25, 2024


Vulnerability identifier: #VU71332
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2023-22809
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: Public exploit is available
Vulnerable software:
Sudo
Software vendor:
Sudo

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists within the sudoedit (aka -e) feature due to insufficient validation of user-supplied input passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR). The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. A local user can append arbitrary entries to the list of files to process and escalate privileges on the system.


Remediation

Install updates from vendor's website.

External links