3.3
CVSSv3

CVE-2021-31153

Published: 27/05/2021 Updated: 12/07/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

please prior to 0.4 allows a local unprivileged malicious user to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the --check option, or the -d option.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

please project please

Mailing Lists

Hello list, "please" [1] is a sudo replacement written in Rust Its author requested a code review for inclusion of the setuid-root binary in openSUSE [2] I reviewed the source of please version 033 and found multiple security issues including a local root exploit (item 1d) for users that are allowed to run a command You can find the detaile ...