diff --git a/cve/sudo/2023/CVE-2023-26604/checker.sh b/cve/sudo/2023/CVE-2023-26604/checker.sh new file mode 100644 index 0000000000000000000000000000000000000000..b0c8aa486d2cc527da104c7d605f678a8a06cd57 --- /dev/null +++ b/cve/sudo/2023/CVE-2023-26604/checker.sh @@ -0,0 +1,10 @@ +#!/bin/sh + +version=$(systemd --version | awk -F " " '{print $2}'| awk -F "+" '{print $1}') + +if (($version < "247")) then + echo 'Vulnerable' +else + echo 'Not vulnerable' +fi + diff --git a/cve/sudo/2023/yaml/CVE-2023-26604.yaml b/cve/sudo/2023/yaml/CVE-2023-26604.yaml new file mode 100644 index 0000000000000000000000000000000000000000..2791617467db87e1cf370986a8519b67298908cf --- /dev/null +++ b/cve/sudo/2023/yaml/CVE-2023-26604.yaml @@ -0,0 +1,20 @@ +id: CVE-2023-26604 +source: https://github.com/Zenmovie/CVE-2023-26604 +info: + name: Sudo 是一个用于类 Unix 计算机操作系统的程序,它能够使用户能够以另一个用户(默认是超级用户)的安全权限运行程序。 + severity: high + description: + 对于某些Sudo配置(例如,可能执行“systemctl status”命令的可信sudoers文件),247之前的systemd没有充分阻止本地权限升级。具体而言,systemd不将LESSSECURE设置为1,因此可以从较少的程序启动其他程序。当从Sudo运行systemctl时,这会带来很大的安全风险,因为当终端大小太小而无法显示完整的systemctl输出时,很少以root身份执行。 + scope-of-influence: + 小于247 + references: + - https://nvd.nist.gov/vuln/detail/CVE-2023-26604 + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.8 + cve-id: CVE-2023-26604 + cwe-id: None + cnvd-id: None + kve-id: None + tags: + - Sudo配置问题 \ No newline at end of file diff --git a/openkylin_list.yaml b/openkylin_list.yaml index d83e8b4f7d85f277310e0c2a15fed2adec5b3dff..ab6c973a5e56bd4e0631ee5275572b3021d76166 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -50,6 +50,7 @@ cve: sudo: - CVE-2021-3156 - CVE-2023-22809 + - CVE-2023-26604 gitlab: - CVE-2021-22205 - CVE-2021-22214