CVE-2023-22809

HIGH EXPLOITED

Sudoedit Extra Arguments Priv Esc

Title source: metasploit

Description

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

Exploits (19)

exploitdb WORKING POC
by n3m1.sys · bashlocallinux
https://www.exploit-db.com/exploits/51217
nomisec WORKING POC 160 stars
by n3m1sys · poc
https://github.com/n3m1sys/CVE-2023-22809-sudoedit-privesc
nomisec WORKING POC 7 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2023-22809-sudo-POC
nomisec WORKING POC 6 stars
by asepsaepdin · local
https://github.com/asepsaepdin/CVE-2023-22809
nomisec WORKING POC 6 stars
by M4fiaB0y · local
https://github.com/M4fiaB0y/CVE-2023-22809
nomisec WORKING POC 2 stars
by D0rDa4aN919 · local
https://github.com/D0rDa4aN919/CVE-2023-22809-Exploiter
nomisec WORKING POC 2 stars
by Toothless5143 · local
https://github.com/Toothless5143/CVE-2023-22809
nomisec WORKING POC 2 stars
by Chan9Yan9 · local
https://github.com/Chan9Yan9/CVE-2023-22809
nomisec WORKING POC 1 stars
by Spydomain · poc
https://github.com/Spydomain/CVE-2023-22809-automated-python-exploits
github WORKING POC 1 stars
by Shockp · pythonpoc
https://github.com/Shockp/CVE-Exploits/tree/main/CVE-2023-22809 (sudoedit)
nomisec WORKING POC
by ValeuDoamne · local
https://github.com/ValeuDoamne/CVE-2023-22809
nomisec SUSPICIOUS
by laxmiyamkolu · poc
https://github.com/laxmiyamkolu/SUDO-privilege-escalation
nomisec WORKING POC
by pashayogi · local
https://github.com/pashayogi/CVE-2023-22809
nomisec STUB
by hello4r1end · poc
https://github.com/hello4r1end/patch_CVE-2023-22809
vulncheck_xdb WRITEUP
local
https://github.com/AdrianM756/CyberSec_Documentation
vulncheck_xdb WORKING POC
local
https://github.com/spidoman/CVE-2023-22809-automated-python-exploits
vulncheck_xdb NO CODE
local
https://github.com/RESOLUTE-ATTACK/CVES
metasploit WORKING POC EXCELLENT
by h00die, Matthieu Barjole, Victor Cutillas · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/sudoedit_bypass_priv_esc.rb

References (14)

Scores

CVSS v3 7.8
EPSS 0.4860
EPSS Percentile 97.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-12-06
CWE
CWE-269
Status published
Products (7)
apple/macos < 13.4
debian/debian_linux 10.0
debian/debian_linux 11.0
fedoraproject/fedora 36
fedoraproject/fedora 37
sudo_project/sudo 1.9.12 (2 CPE variants)
sudo_project/sudo 1.8.0 - 1.9.12
Published Jan 18, 2023
Tracked Since Feb 18, 2026