Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-42456

Опубликовано: 21 сент. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 3.1

Описание

Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. Only once a configurable timeout has passed will the user have to re-authenticate themselves. Supporting this functionality is a set of session files (timestamps) for each user, stored in /var/run/sudo-rs/ts. These files are named according to the username from which the sudo attempt is made (the origin user). An issue was discovered in versions prior to 0.2.1 where usernames containing the . and / characters could result in the corruption of specific files on the filesystem. As usernames are generally not limited by the characters they can contain, a username appearing to be a relative path can be constructed. For example we could add a user to the system containing the username ../../../../bin/cp. When logged in as a user with that name, that user cou...

РелизСтатусПримечание
bionic

DNE

devel

not-affected

0.2.1-1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

trusty

DNE

upstream

needs-triage

xenial

DNE

Показывать по

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 3.1
nvd
почти 2 года назад

Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. Only once a configurable timeout has passed will the user have to re-authenticate themselves. Supporting this functionality is a set of session files (timestamps) for each user, stored in `/var/run/sudo-rs/ts`. These files are named according to the username from which the sudo attempt is made (the origin user). An issue was discovered in versions prior to 0.2.1 where usernames containing the `.` and `/` characters could result in the corruption of specific files on the filesystem. As usernames are generally not limited by the characters they can contain, a username appearing to be a relative path can be constructed. For example we could add a user to the system containing the username `../../../../bin/cp`. When logged in as a user with that name, that user could

CVSS3: 3.1
debian
почти 2 года назад

Sudo-rs, a memory safe implementation of sudo and su, allows users to ...

CVSS3: 3.1
github
почти 2 года назад

sudo-rs Session File Relative Path Traversal vulnerability

CVSS3: 8.1
fstec
почти 2 года назад

Уязвимость программ системного администрирования Sudo-rs, связанная с недостаточной проверкой введенных пользователем командных аргументов, позволяющая нарушителю повысить свои привилегии путём создания специально сформированного имени пользователя

CVSS3: 8.1
redos
около 1 года назад

Множественные уязвимости sudo

3.1 Low

CVSS3