From d6f95a606b23c8f1c8bb57b214d0f162d1069ab8 Mon Sep 17 00:00:00 2001 From: sugarh Date: Wed, 15 Mar 2023 17:17:53 +0800 Subject: [PATCH] add CVE-2023-26604 --- cve/sudo/2023/CVE-2023-26604/checker.sh | 10 ++++++++++ cve/sudo/2023/yaml/CVE-2023-26604.yaml | 20 ++++++++++++++++++++ openkylin_list.yaml | 1 + 3 files changed, 31 insertions(+) create mode 100644 cve/sudo/2023/CVE-2023-26604/checker.sh create mode 100644 cve/sudo/2023/yaml/CVE-2023-26604.yaml diff --git a/cve/sudo/2023/CVE-2023-26604/checker.sh b/cve/sudo/2023/CVE-2023-26604/checker.sh new file mode 100644 index 00000000..b0c8aa48 --- /dev/null +++ b/cve/sudo/2023/CVE-2023-26604/checker.sh @@ -0,0 +1,10 @@ +#!/bin/sh + +version=$(systemd --version | awk -F " " '{print $2}'| awk -F "+" '{print $1}') + +if (($version < "247")) then + echo 'Vulnerable' +else + echo 'Not vulnerable' +fi + diff --git a/cve/sudo/2023/yaml/CVE-2023-26604.yaml b/cve/sudo/2023/yaml/CVE-2023-26604.yaml new file mode 100644 index 00000000..27916174 --- /dev/null +++ b/cve/sudo/2023/yaml/CVE-2023-26604.yaml @@ -0,0 +1,20 @@ +id: CVE-2023-26604 +source: https://github.com/Zenmovie/CVE-2023-26604 +info: + name: Sudo 是一个用于类 Unix 计算机操作系统的程序,它能够使用户能够以另一个用户(默认是超级用户)的安全权限运行程序。 + severity: high + description: + 对于某些Sudo配置(例如,可能执行“systemctl status”命令的可信sudoers文件),247之前的systemd没有充分阻止本地权限升级。具体而言,systemd不将LESSSECURE设置为1,因此可以从较少的程序启动其他程序。当从Sudo运行systemctl时,这会带来很大的安全风险,因为当终端大小太小而无法显示完整的systemctl输出时,很少以root身份执行。 + scope-of-influence: + 小于247 + references: + - https://nvd.nist.gov/vuln/detail/CVE-2023-26604 + classification: + cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H + cvss-score: 7.8 + cve-id: CVE-2023-26604 + cwe-id: None + cnvd-id: None + kve-id: None + tags: + - Sudo配置问题 \ No newline at end of file diff --git a/openkylin_list.yaml b/openkylin_list.yaml index fb364672..a08f9261 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -48,6 +48,7 @@ cve: sudo: - CVE-2021-3156 - CVE-2023-22809 + - CVE-2023-26604 gitlab: - CVE-2021-22205 - CVE-2021-22214 -- Gitee