2.5
CVSSv3

CVE-2021-23239

Published: 12/01/2021 Updated: 09/11/2022
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 2.5 | Impact Score: 1.4 | Exploitability Score: 1
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The sudoedit personality of Sudo prior to 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sudo project sudo

netapp cloud backup -

netapp solidfire -

netapp hci management node -

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 10.0

Vendor Advisories

Arch Linux Security Advisory ASA-202101-25 ========================================== Severity: Low Date : 2021-01-20 CVE-ID : CVE-2021-23239 Package : sudo Type : information disclosure Remote : No Link : securityarchlinuxorg/AVG-1431 Summary ======= The package sudo before version 195-1 is vulnerable to information discl ...
A security issue was found in sudo before version 195 A race condition in sudoedit could have allowed an attacker to test for the existence of directories in arbitrary locations in the file system ...

Mailing Lists

Hello list, concerns have been raised with us about half a year ago that new features like the python plugin in sudo [1] major version 19 could have introduced new security issues Recently I performed a review of the current sudo code base and found a couple of minor and moderate issues (not necessarily in the new features) that will be addresse ...

Github Repositories

CVE-2021-23239 The sudoedit personality of Sudo before 195 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_editc race condition in replacing a user-controlled directory by a symlink to an arbitrary path authentication complexity vector NONE MEDIUM LOCAL confidentiality integrity availability PARTIAL NONE