local privilege escalation in apport-cli
CVE-2023-1326
Key Information:
- Vendor
- Canonical Ltd.
- Status
- Vendor
- CVE Published:
- 13 April 2023
Badges
Summary
A vulnerability has been identified in apport-cli versions 2.26.0 and earlier, which may allow a local attacker to escalate privileges under specific conditions. If a system is misconfigured to allow unprivileged users to execute sudo with apport-cli as the command, and if appropriate settings for the pager and terminal size are altered, this could lead to unauthorized privilege escalation. Such configurations are deemed highly unlikely, making the exposure limited. However, it highlights the importance of maintaining strict user permissions and regular audits to prevent potential exploit attempts.
Affected Version(s)
Apport Linux 0 <= 2.26.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved