CVE-2023-7090
Sudo: improper handling of ipa_hostname leads to privilege mismanagement
CVSS Score
6.6
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
| CWE | CWE-269 |
| Vendor | n/a |
| Product | sudo |
| Published | Dec 23, 2023 |
| Last Updated | Aug 2, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a sudo
Be the first to know when new medium vulnerabilities affecting n/a sudo are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
n/a / sudo
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Fedora / Fedora
All versions affected Fedora / Fedora
All versions affected References
access.redhat.com: https://access.redhat.com/security/cve/CVE-2023-7090 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2255723 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/02/msg00002.html security.netapp.com: https://security.netapp.com/advisory/ntap-20240208-0001/ sudo.ws: https://www.sudo.ws/releases/legacy/#1.8.28
Credits
This issue was discovered by Mohammad Tausif Siddiqui (Red Hat Product Security).