Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q428-6v73-fc4q

Опубликовано: 13 нояб. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.4

Описание

sudo-rs doesn't record authenticating user properly in timestamp

Summary

When Defaults targetpw (or Defaults rootpw) is enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs prior to 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later sudo invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it.

Impact

A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts.

A common instance of this would be that a user can still use their own password to run commands as root (the default behaviour of sudo), effectively negating the intended behaviour of the targetpw or rootpw options.

Example

With this in /etc/sudoers:

Defaults targetpw user ALL=(ALL:ALL) ALL

First run:

user@machine$ sudo -g root whoami [sudo: authenticate] Password: <password for user> user

Then run:

user@machine$ sudo -u root whoami root

Affected versions

sudo-rs prior to 0.2.5 are not affected, since they do not offer Defaults targetpw or Defaults rootpw.

Credits

This issue was discovered and reported by @Pingasmaster.

Пакеты

Наименование

sudo-rs

rust
Затронутые версииВерсия исправления

>= 0.2.5, < 0.2.10

0.2.10

EPSS

Процентиль: 7%
0.00027
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 4.4
ubuntu
3 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use ...

CVSS3: 4.4
nvd
3 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. With `Defaults targetpw` (or `Defaults rootpw`) enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. sudo-rs starting in version 0.2.5 and prior to version 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp was still valid would use that timestamp, potentially bypassing new authentication even if the policy would have required it. A highly-privileged user (able to run commands as other users, or as root, through sudo) who knows one password of an account they are allowed to run commands as, would be able to run commands as any other account the policy permits them to run commands for, even if they don't know the password for those accounts. A common instance of this would be that a user can still use the

CVSS3: 4.4
debian
3 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust ...

EPSS

Процентиль: 7%
0.00027
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-287