Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cxqf-2pgv-vx9p

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."

EPSS

Процентиль: 90%
0.05506
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

redhat
больше 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

nvd
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

debian
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges v ...

EPSS

Процентиль: 90%
0.05506
Низкий