Privilege Escalation Vulnerability in Sudo Product by Sudo Project
CVE-2015-5602
Key Information:
- Vendor
- Sudo Project
- Status
- Vendor
- CVE Published:
- 17 November 2015
Badges
Summary
A vulnerability in the Sudo command-line utility prior to version 1.8.15 permits local users to exploit a symlink attack. This is executed through a file referenced in the /etc/sudoers configuration where wildcards are unabatedly utilized in defining paths. An attacker may leverage this weakness to gain elevated privileges on the system, potentially compromising its security and integrity. Mitigating this risk necessitates updating to the latest version of Sudo or configuring the /etc/sudoers file to avoid the use of wildcard characters.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
6% chance of being exploited in the next 30 days.
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved