CVE-2023-22809
CVSS V2 None
CVSS V3 None
Description
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
Overview
- CVE ID
- CVE-2023-22809
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2023-01-18T17:15:10
- Last Modified Date
- 2023-05-03T12:16:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* | 1 | OR | 1.8.0 | 1.9.12 |
cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:sudo_project:sudo:1.9.12:p1:*:*:*:*:*:* | 1 | OR |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-22809 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-18 18:18:35 | Added to TrackCVE | |||
2023-01-18 19:18:56 | 2023-01-18T19:15:12 | CVE Modified Date | updated | |
2023-01-18 19:18:58 | References | updated | ||
2023-01-18 20:14:15 | 2023-01-18T19:46:26 | CVE Modified Date | updated | |
2023-01-18 20:14:15 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-19 00:18:23 | 2023-01-19T00:15:10 | CVE Modified Date | updated | |
2023-01-19 00:18:24 | References | updated | ||
2023-01-19 12:14:32 | 2023-01-19T10:15:11 | CVE Modified Date | updated | |
2023-01-19 12:14:33 | References | updated | ||
2023-01-22 04:16:08 | 2023-01-22T04:15:11 | CVE Modified Date | updated | |
2023-01-22 04:16:09 | References | updated | ||
2023-01-25 17:14:37 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-26 19:16:40 | 2023-01-26T18:26:49 | CVE Modified Date | updated | |
2023-01-26 19:16:40 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-26 19:16:40 | Weakness Enumeration | new | ||
2023-01-26 19:16:41 | CPE Information | updated | ||
2023-01-27 21:14:10 | 2023-01-27T20:15:15 | CVE Modified Date | updated | |
2023-01-27 21:14:10 | Analyzed | Modified | Vulnerability Status | updated |
2023-01-27 21:14:11 | References | updated | ||
2023-01-30 17:14:46 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-31 19:13:15 | 2023-01-31T19:05:59 | CVE Modified Date | updated | |
2023-01-31 19:13:15 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-05 07:14:42 | 2023-02-05T05:15:09 | CVE Modified Date | updated | |
2023-02-05 07:14:42 | Analyzed | Modified | Vulnerability Status | updated |
2023-02-05 07:14:43 | References | updated | ||
2023-04-03 22:17:41 | 2023-04-03T20:15:08 | CVE Modified Date | updated | |
2023-04-03 22:17:43 | References | updated | ||
2023-05-03 13:03:51 | 2023-05-03T12:16:45 | CVE Modified Date | updated | |
2023-05-03 13:04:01 | References | updated |