Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9q3-g4p5-5q2r

Опубликовано: 13 мая 2025
Источник: github
Github: Прошло ревью
CVSS3: 3.3

Описание

sudo-rs Allows Low Privilege Users to Enumerate Privileges of Others

Summary

Users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the -U flag. This doesn't happen with the original sudo.

PoC

The initial test has been done in a container running Ubuntu 24.04 and installing oxidizr, running sudo-rs 0.2.2.

A user (bob) has been added with only ps command executable through sudo:

root ALL=(ALL:ALL) ALL bob ALL=(ALL:ALL) /usr/bin/ps

The user is not able to read the /etc/sudoers file and running sudo -l -Uroot with original sudo (version 1.9.15p5) causes the following error:

Sorry, user bob is not allowed to execute 'list' as root on 43d4aed3cdbd.

The same command with sudo-rs is run without denying the execution:

User root may run the following commands on 43d4aed3cdbd: (ALL : ALL) ALL

The same happens for other non-root users:

bob@43d4aed3cdbd:~$ sudo -l -Ufoo User foo may run the following commands on 43d4aed3cdbd: (ALL : ALL) /usr/bin/whoami

The behavior has been also been observed for version 0.2.5.

Impact

Users with limited sudo privileges can enumerate the sudoers file, revealing sensitive information about other users' permissions. Attackers can collect information that can be used to more targeted attacks.

Systems where users either do not have sudo privileges or have the ability to run all commands as root through sudo (the default configuration on most systems) are not affected by this advisory.

Credits

This issue was identified by Sonia Zorba.

Пакеты

Наименование

sudo-rs

rust
Затронутые версииВерсия исправления

< 0.2.6

0.2.6

EPSS

Процентиль: 1%
0.00014
Низкий

3.3 Low

CVSS3

Дефекты

CWE-497

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the `-U` flag. This vulnerability allows users with limited sudo privileges to enumerate the sudoers file, revealing sensitive information about other users' permissions. Attackers can collect information that can be used to more targeted attacks. Systems where users either do not have sudo privileges or have the ability to run all commands as root through sudo (the default configuration on most systems) are not affected by this advisory. Version 0.2.6 fixes the vulnerability.

CVSS3: 3.3
nvd
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with limited sudo privileges (e.g. execution of a single command) can list sudo privileges of other users using the `-U` flag. This vulnerability allows users with limited sudo privileges to enumerate the sudoers file, revealing sensitive information about other users' permissions. Attackers can collect information that can be used to more targeted attacks. Systems where users either do not have sudo privileges or have the ability to run all commands as root through sudo (the default configuration on most systems) are not affected by this advisory. Version 0.2.6 fixes the vulnerability.

CVSS3: 3.3
debian
около 1 месяца назад

sudo-rs is a memory safe implementation of sudo and su written in Rust ...

EPSS

Процентиль: 1%
0.00014
Низкий

3.3 Low

CVSS3

Дефекты

CWE-497