CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
sudo_projectsudo
1.8.0 ≤
𝑥
< 1.9.12
sudo_projectsudo
1.9.12
sudo_projectsudo
1.9.12:p1
debiandebian_linux
10.0
debiandebian_linux
11.0
applemacos
𝑥
< 13.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sudo
bullseye (security)
1.9.5p2-3+deb11u1
fixed
bullseye
1.9.5p2-3+deb11u1
fixed
bookworm
1.9.13p3-1+deb12u1
fixed
sid
1.9.16p1-1
fixed
trixie
1.9.16p1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sudo
lunar
Fixed 1.9.11p3-1ubuntu3
released
kinetic
Fixed 1.9.11p3-1ubuntu1.1
released
jammy
Fixed 1.9.9-1ubuntu2.2
released
focal
Fixed 1.8.31-1ubuntu1.4
released
bionic
Fixed 1.8.21p2-3ubuntu1.5
released
xenial
Fixed 1.8.16-0ubuntu1.10+esm1
released
trusty
Fixed 1.8.9p5-1ubuntu1.5+esm7
released
References