Jan. 18, 2023, 5:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

argument cve editor environment escalation files list local may path privilege privilege escalation problem process protection sudo sudoedit value vim

Expert Global Security Solutions Specialist

@ CHS Inc. | Inver Grove Heights, MN, US, 55077-1721

Security Operations Senior Associate - Perimeter Response

@ JPMorgan Chase & Co. | Houston, TX, United States

Cybersecurity Engineer IV

@ ManTech | 203O - CustomerSite,Washington,DC

Senior Site Reliability Engineer - Security

@ Klaviyo | Boston, MA

Information Security Specialist (Cloud Security)

@ Vertiv | Philippines

Business Value Consultant

@ Sumo Logic | United States