CVE-2023-1521

HIGH

sccache - RCE

Title source: llm

Description

On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD. If the server is run as root (which is the default when installing the snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges.

Exploits (1)

nomisec WORKING POC
by rubbxalc · poc
https://github.com/rubbxalc/CVE-2023-1521

Scores

CVSS v3 7.8
EPSS 0.0032
EPSS Percentile 55.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-426
Status published
Products (2)
crates.io/sccache 0 - 0.4.0crates.io
mozilla/sccache < 0.4.0
Published Nov 26, 2024
Tracked Since Feb 18, 2026