Sudoedit Feature Mishandles User-Provided Environment Variables, Leading to Privilege Escalation
CVE-2023-22809

7.8HIGH

Key Information:

Vendor
Sudo Project
Status
Sudo
Vendor
CVE Published:
18 January 2023

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

The first article discusses a vulnerability in the Sudo project that mishandles user-provided environment variables, leading to privilege escalation. This affects versions 1.8.0 through 1.9.12.p1 of Sudo, and it has been exploited in the wild. In the second article, a set of memory corruption vulnerabilities in the ncurses library could allow attackers to elevate privileges and run code in the targeted program's context or perform other malicious actions. Microsoft discovered these vulnerabilities and worked with relevant maintainers to deploy fixes and encourage users of ncurses to update their instances and systems.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2023-22809 Impact of Sudo Vulnerability CVE-2023-22809

Palo Alto Networks Security Advisory: CVE-2023-22809 Impact of Sudo Vulnerability CVE-2023-22809 The Palo Alto Networks Product Security Assurance team has evaluated the sudo software vulnerability CVE-2023-22809 and has determined that the following Palo Alto Networks products do not expose the sud...

7 months ago

nabbisen — DEV Community Profile

Founder of Scqr Inc. (scqr.net) Apps dev and c/s monk. IT ストラテジスト. Interested: Social relationships. OpenBSD/Rust etc.

7 months ago

Uncursing the ncurses: Memory corruption vulnerabilities found in library | Microsoft Security Blog

A set of memory corruption vulnerabilities in the ncurses library could have allowed attackers to chain the vulnerabilities to elevate privileges and run code in the targeted program's context or perform other malicious actions.

1 year ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by Microsoft

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.