# N/A
## 漏洞概述
在 Sudo 1.9.12p2 之前的版本中,sudoedit(也即 -e 特性)功能处理用户提供的环境变量(SUDO_EDITOR, VISUAL, 和 EDITOR)中的额外参数时存在缺陷,允许本地攻击者向要处理的文件列表中追加任意条目。
## 影响版本
1.8.0 至 1.9.12.p1
## 细节
问题在于用户指定的编辑器中可能包含一个 "--" 参数,这会绕过保护机制,例如,设置 `EDITOR='vim -- /path/to/extra/file'`。
## 影响
这种漏洞可能导致权限提升。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc | POC详情 |
2 | None | https://github.com/M4fiaB0y/CVE-2023-22809 | POC详情 |
3 | CVE-2023-22809 Linux Sudo | https://github.com/CKevens/CVE-2023-22809-sudo-POC | POC详情 |
4 | None | https://github.com/hello4r1end/patch_CVE-2023-22809 | POC详情 |
5 | Analysis & Exploit | https://github.com/Chan9Yan9/CVE-2023-22809 | POC详情 |
6 | None | https://github.com/pashayogi/CVE-2023-22809 | POC详情 |
7 | None | https://github.com/asepsaepdin/CVE-2023-22809 | POC详情 |
8 | Running this exploit on a vulnerable system allows a local attacker to gain a root shell on the machine. | https://github.com/Toothless5143/CVE-2023-22809 | POC详情 |
9 | A script to automate privilege escalation with CVE-2023-22809 vulnerability | https://github.com/n3m1sys/CVE-2023-22809-sudoedit-privesc | POC详情 |
10 | CVE-2023-22809 Linux Sudo | https://github.com/3yujw7njai/CVE-2023-22809-sudo-POC | POC详情 |
11 | None | https://github.com/AntiVlad/CVE-2023-22809 | POC详情 |
12 | Sudo Privilege Escalation: CVE-2023-22809 Simulation This project simulates the Sudo privilege escalation vulnerability (CVE-2023-22809) to demonstrate how unauthorized root access can be gained. It involves identifying and exploiting this vulnerability in a controlled environment using Parrot OS, the Sudo command, and Bash scripting. | https://github.com/laxmiyamkolu/SUDO-privilege-escalation | POC详情 |
13 | None | https://github.com/D0rDa4aN919/CVE-2023-22809-Exploiter | POC详情 |
14 | CVE-2023-22809 Linux Sudo | https://github.com/AiK1d/CVE-2023-22809-sudo-POC | POC详情 |
15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Linux%20sudo%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-22809.md | POC详情 |
16 | automatically exploit the sudoedit vulnerability fo CVE-2023-22809 | https://github.com/spidoman/CVE-2023-22809-automated-python-exploits | POC详情 |
暂无评论