Vulnerability Name: | CVE-2023-22809 (CCN-245036) | ||||||||||||||||||||||||||||
Assigned: | 2023-01-06 | ||||||||||||||||||||||||||||
Published: | 2023-01-06 | ||||||||||||||||||||||||||||
Updated: | 2023-05-23 | ||||||||||||||||||||||||||||
Summary: | Sudo could allow a local authenticated attacker to gain elevated privileges on the system, caused by mishandling extra arguments passed in the user-provided environment variables. By appending arbitrary entries to the list of files to process, an attacker could exploit this vulnerability to achieve privilege escalation. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privilege | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-22809 Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: cve@mitre.org Type: Exploit, Mailing List, Third Party Advisory cve@mitre.org Source: CCN Type: Red Hat Bugzilla - Bug 2161142 CVE-2023-22809 sudo: arbitrary file write with privileges of the RunAs user Source: XF Type: UNKNOWN sudo-cve202322809-priv-esc(245036) Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Mailing List, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: CCN Type: Packet Storm Security [04-03-2023] sudo 1.9.12p1 Privilege Escalation Source: CCN Type: Packet Storm Security [05-23-2023] Sudoedit Extra Arguments Privilege Escalation Source: CCN Type: OSS Mailing List, Thu, 19 Jan 2023 01:33:43 +0100 CVE-2023-22809: Sudoedit can edit arbitrary files Source: cve@mitre.org Type: UNKNOWN cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: IBM Security Bulletin 6965816 (Spectrum Protect Plus) Vulnerabilities in Node.js, libcurl, Golang Go, Jetty, Guava, Netty, OpenSSL, Linux kernel may affect IBM Spectrum Protect Plus Source: CCN Type: IBM Security Bulletin 6967333 (QRadar SIEM) IBM QRadar SIEM includes components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 7000021 (Security Guardium) IBM Security Guardium is affected by a multiple vulnerabilities (CVE-2023-22809, CVE-2019-12490, CVE-2013-0041) Source: CCN Type: Sudo Web site Sudoedit can edit arbitrary files Source: cve@mitre.org Type: Exploit, Mitigation, Vendor Advisory cve@mitre.org Source: CCN Type: Synacktiv Sudoedit bypass in Sudo <= 1.9.12p1 Source: cve@mitre.org Type: Exploit, Mitigation, Technical Description, Third Party Advisory cve@mitre.org | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |