Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade linux-pam/linux-pam
to version 1.5.0 or higher.
Affected versions of this package are vulnerable to Incorrect Authorization via improper enforcement of access controls in the pam_env
module. An attacker can gain elevated privileges by exploiting this weakness to perform actions typically restricted to users with physical console access, potentially allowing unauthorized control over system configurations, services, or other sensitive operations.
##Workaround
For the users of Linux-PAM <=1.4.0 it is recommended to set pam_env
parameter user_readenv
to 0. It is set to 0 by default since Linux-PAM 1.4.0.
In the version 1.5.0 the functionality is deprecated.