Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-98cv-wqjx-wx8f

Опубликовано: 13 мая 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.3

Описание

sudo-rs Allows Low Privilege Users to Discover the Existence of Files in Inaccessible Folders

Summary

Users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using sudo --list <pathname>.

PoC

As root:

# mkdir /tmp/foo # chmod a-rwx /tmp/foo # touch /tmp/foo/secret_file

As a user without any (or limited) sudo rights:

$ sudo --list /tmp/foo/nonexistent_file sudo-rs: '/tmp/foo/nonexistent_file': command not found $ $ sudo --list /tmp/foo/secret_file sudo-rs: Sorry, user eve may not run sudo on host.

I.e. the user can distinguish whether files exist.

Related

Original sudo (vulnerable version tested by us: 1.9.15p5) exhibited similar behaviour for files with the executable bit set.

Impact

Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks.

Credits

This issue was identified by sudo-rs developer Marc Schoolderman

Пакеты

Наименование

sudo-rs

rust
Затронутые версииВерсия исправления

<= 0.2.5

0.2.6

EPSS

Процентиль: 2%
0.00015
Низкий

3.3 Low

CVSS3

Дефекты

CWE-497

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.

CVSS3: 3.3
nvd
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.

CVSS3: 3.3
debian
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust ...

EPSS

Процентиль: 2%
0.00015
Низкий

3.3 Low

CVSS3

Дефекты

CWE-497