7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
19.7%
Software: sudo 1.8.23
OS: rosa-server79
package_evr_string: sudo-1.8.23-11
CVE-ID: CVE-2023-22809
BDU-ID: 2023-00210
CVE-Crit: HIGH
CVE-DESC: A vulnerability in the sudoedit function of the Sudo system administration program is related to errors in the handling of additional arguments in environment variables. Exploitation of the vulnerability could allow an attacker acting remotely to escalate their privileges
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value.
CVE-STATUS: Fixed
CVE-REC: Run yum update sudo command to close it