Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade linux-pam/linux-pam
to version 1.5.0 or higher.
Affected versions of this package are vulnerable to Incorrect Authorization via improper enforcement of access controls in the pam_env
module. An attacker can gain elevated privileges by exploiting this weakness to perform actions typically restricted to users with physical console access, potentially allowing unauthorized control over system configurations, services, or other sensitive operations.
##Workaround
For the users of Linux-PAM <=1.4.0 it is recommended to set pam_env
parameter user_readenv
to 0. It is set to 0 by default since Linux-PAM 1.4.0.
In the version 1.5.0 the functionality is deprecated.