Relative Path Traversal Affecting sudo-rs package, versions <0.2.1


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Relative Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-SUDORS-5914640
  • published22 Sept 2023
  • disclosed21 Sept 2023
  • creditAndrea Jegher

Introduced: 21 Sep 2023

CVE-2023-42456  (opens in a new tab)
CWE-23  (opens in a new tab)

How to fix?

Upgrade sudo-rs to version 0.2.1 or higher.

Overview

Affected versions of this package are vulnerable to Relative Path Traversal via the /var/run/sudo-rs/ts endpoint. which allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group.

Note: An attacker needs to be able to login as a user with a constructed username. Given that such a username is unlikely to exist on an existing system, they will also need to be able to create the users with the constructed usernames.

Workaround

Make sure that the system does not contain any users with a specially crafted username.

References

CVSS Scores

version 3.1