Privilege Escalation Vulnerability in Sudo Product by Sudo Project
CVE-2015-5602
Currently unrated
Key Information:
- Vendor
Sudo Project
- Status
- Vendor
- CVE Published:
- 17 November 2015
Badges
👾 Exploit Exists🟡 Public PoC
What is CVE-2015-5602?
A vulnerability in the Sudo command-line utility prior to version 1.8.15 permits local users to exploit a symlink attack. This is executed through a file referenced in the /etc/sudoers configuration where wildcards are unabatedly utilized in defining paths. An attacker may leverage this weakness to gain elevated privileges on the system, potentially compromising its security and integrity. Mitigating this risk necessitates updating to the latest version of Sudo or configuring the /etc/sudoers file to avoid the use of wildcard characters.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.