Privilege Escalation Affecting github.com/aws/amazon-ssm-agent/agent/session/utility package, versions <3.1.1208


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMAWSAMAZONSSMAGENTAGENTSESSIONUTILITY-2769580
  • published20 Apr 2022
  • disclosed20 Apr 2022
  • creditUnknown

Introduced: 20 Apr 2022

CVE-2022-29527  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade github.com/aws/amazon-ssm-agent/agent/session/utility to version 3.1.1208 or higher.

Overview

github.com/aws/amazon-ssm-agent/agent/session/utility is an implements all the shared methods between clients.

Affected versions of this package are vulnerable to Privilege Escalation by creating a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.

CVSS Scores

version 3.1