关联漏洞
标题:
Sudo 安全漏洞
(CVE-2023-22809)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 1.9.12p2 之前的 Sudo存在安全漏洞,该漏洞源于sudoedit(又名 -e)功能错误处理用户提供的环境变量(SUDO_EDITOR、VISUAL 和 EDITOR)中传递的额外参数,从而允许本地攻击者将任意条目附加到要处理的文件列表中 . 这可能导致特权升级。
描述
automatically exploit the sudoedit vulnerability fo CVE-2023-22809
介绍
# CVE-2023-22809-automated-python-exploits
automatically exploit the sudoedit vulnerability fo CVE-2023-22809
For guide use the following link
https://medium.com/@spydomain1/cve-2023-22809-f36a2b3804b3
# CVE-2023-22809 Automated Exploit - Python Script
## 📌 Description
This Python script automates the exploitation of **CVE-2023-22809**, a vulnerability affecting certain versions of `sudo` when used with `sudoedit`. If the user is allowed to run `sudoedit` or `sudo -e` on arbitrary files **as root**, privilege escalation is possible. This script checks for the vulnerable version, verifies `sudoedit` privileges, and then helps escalate to root by modifying `/etc/sudoers`.
> ⚠️ **DISCLAIMER:** This tool is for educational and authorized penetration testing purposes only. Do not use it on systems you do not own or have permission to test.
---
## 🧠 Vulnerability Overview
- **CVE ID:** CVE-2023-22809
- **Vulnerable sudo versions:**
- 1.8
- 1.9.0 to 1.9.3
- 1.9.12p1
- **Affected feature:** `sudoedit` (`sudo -e`)
- **Impact:** Local Privilege Escalation (LPE) to root
---
## ⚙️ How It Works
1. **Version Check:** Confirms the installed `sudo` version is within the vulnerable range.
2. **Sudo Privilege Check:** Verifies if the current user has access to `sudoedit` or `sudo -e` as root or with `(ALL)` privileges.
3. **Exploitation Steps:**
- Displays the line to add into the `/etc/sudoers` file.
- Opens `/etc/sudoers` with `sudoedit`.
- Grants root shell using `sudo su root`.
---
## 🧪 Requirements
- Python 3.x
- Sudo installed on the target machine
- Vulnerable `sudo` version installed
- Target user has `sudoedit` access with `(root)` or `(ALL)` privileges
---
## 🚀 Usage
```bash
python3 cve-2023-22809.py
文件快照
[4.0K] /data/pocs/c7d3c9dd07f7a40e41868d374b734bb54301c054
├── [1.7K] README.md
└── [ 797] script.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。