May 23, 2023, 2:12 p.m. |

Packet Storm packetstormsecurity.com

This exploit takes advantage of a vulnerability in sudoedit, part of the sudo package. The sudoedit (aka sudo -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. by appending extra entries on /etc/sudoers allowing for execution of an arbitrary payload with root privileges. Affected versions are 1.8.0 through 1.9.12.p1. However, this module only …

editor environment escalation exploit files list local package privilege privilege escalation process sudo sudoedit vulnerability

Expert Global Security Solutions Specialist

@ CHS Inc. | Inver Grove Heights, MN, US, 55077-1721

Security Operations Senior Associate - Perimeter Response

@ JPMorgan Chase & Co. | Houston, TX, United States

Cybersecurity Engineer IV

@ ManTech | 203O - CustomerSite,Washington,DC

Senior Site Reliability Engineer - Security

@ Klaviyo | Boston, MA

Information Security Specialist (Cloud Security)

@ Vertiv | Philippines

Business Value Consultant

@ Sumo Logic | United States