๐Ÿ” CVE Alert

CVE-2023-6395

MEDIUM 6.7

Mock: privilege escalation for users that can access mock configuration

CVSS Score
6.7
EPSS Score
0.0%
EPSS Percentile
0th

The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.

CWE CWE-20
Vendor n/a
Product mock
Published Jan 16, 2024
Last Updated Feb 13, 2025
Stay Ahead of the Next One

Get instant alerts for n/a mock

Be the first to know when new medium vulnerabilities affecting n/a mock are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

n/a / mock
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Fedora / Extra Packages for Enterprise Linux
All versions affected
Fedora / Fedora
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-6395 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2252206 github.com: https://github.com/xsuchy/templated-dictionary/commit/0740bd0ca8d487301881541028977d120f8b8933 github.com: https://github.com/xsuchy/templated-dictionary/commit/bcd90f0dafa365575c4b101e6f5d98c4ef4e4b69 openwall.com: http://www.openwall.com/lists/oss-security/2024/01/16/1 openwall.com: http://www.openwall.com/lists/oss-security/2024/01/16/3 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/NBFYREAJH4T7GXXQZ4GJEREN4Q3AHS3K/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/62SP2BJC2AFLFJJAEHPGZ3ZINTBTI7AN/

Credits

Red Hat would like to thank Sankin Nikita Alexeevich for reporting this issue.