diff --git a/cve/gitlab/2023/.keep b/cve/gitlab/2023/.keep new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/cve/sudo/2023/CVE-2023-26604/README.md b/cve/sudo/2023/CVE-2023-26604/README.md new file mode 100644 index 0000000000000000000000000000000000000000..664c475295dabe2d083c00d3d57d7b8bf669cadb --- /dev/null +++ b/cve/sudo/2023/CVE-2023-26604/README.md @@ -0,0 +1,2 @@ +# CVE-2023-26604 +Checker for CVE-2023-26604 diff --git a/cve/sudo/2023/CVE-2023-26604/checker.sh b/cve/sudo/2023/CVE-2023-26604/checker.sh new file mode 100644 index 0000000000000000000000000000000000000000..b0c8aa486d2cc527da104c7d605f678a8a06cd57 --- /dev/null +++ b/cve/sudo/2023/CVE-2023-26604/checker.sh @@ -0,0 +1,10 @@ +#!/bin/sh + +version=$(systemd --version | awk -F " " '{print $2}'| awk -F "+" '{print $1}') + +if (($version < "247")) then + echo 'Vulnerable' +else + echo 'Not vulnerable' +fi + diff --git a/cve/sudo/2023/yaml/CVE-2023-26604.yaml b/cve/sudo/2023/yaml/CVE-2023-26604.yaml new file mode 100644 index 0000000000000000000000000000000000000000..705c1fc670769412bb3985f139e14066b79b4b1c --- /dev/null +++ b/cve/sudo/2023/yaml/CVE-2023-26604.yaml @@ -0,0 +1,20 @@ +id: CVE-2023-26604 +source: https://github.com/Zenmovie/CVE-2023-26604 +info: + name: Sudo 是一个用于类 Unix 计算机操作系统的程序,它能够使用户能够以另一个用户(默认是超级用户)的安全权限运行程序。 + severity: high + description: + 在247之前的systemd不能充分阻止某些Sudo配置的本地特权升级,例如,可能会在其中执行“systemctl status”命令的sudoers文件。具体来说,systemd没有将LESSSECURE设置为1,因此其他程序可能会从less程序启动。当从Sudo运行systemctl时,这会带来很大的安全风险,因为当终端大小太小而无法显示完整的systemctl输出时,less会作为root执行。 + scope-of-influence: + None + references: + - https://nvd.nist.gov/vuln/detail/cve-2023-26604 + classification: + cvss-metrics: None + cvss-score: N/A + cve-id: CVE-2023-26604 + cwe-id: None + cnvd-id: None + kve-id: None + tags: + - 特权升级 \ No newline at end of file diff --git a/openkylin_list.yaml b/openkylin_list.yaml index f822acc2b69f179a6e97f17564d06e258e4fe60d..9d75fadd96d9d1a6bb3593ef48d08a871feb9297 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -27,6 +27,7 @@ cve: sudo: - CVE-2021-3156 - CVE-2023-22809 + - CVE-2023-26604 gitlab: - CVE-2021-22205 - CVE-2022-1162