Lucene search

K
f5F5F5:K000132667
HistoryFeb 20, 2023 - 12:00 a.m.

K000132667 : Sudo vulnerability CVE-2023-22809

2023-02-2000:00:00
my.f5.com
12
sudo
vulnerability
cve-2023-22809
mishandles
user-provided
environment variables
privilege escalation
affected versions
protection mechanism
f5 products

6.7 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.7%

Security Advisory Description

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value. (CVE-2023-22809)

Impact

There is no impact; F5 products are not affected by this vulnerability.