CVE-2023-1326

Severity
7.8HIGH
EPSS
4.5%
top 10.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateApr 14

Description

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:HExploitability: 1.1 | Impact: 6.0

Affected Packages3 packages

Ubuntuapport< 2.20.9-0ubuntu7.29+2
NVDcanonical/apport2.26.0
CVEListV5canonical_ltd./apport2.26.0

Also affects: Ubuntu Linux 18.04, 20.04, 22.04, 22.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qgrc-7333-5cgx: A privilege escalation attack was found in apport-cli 22023-04-14
OSV
CVE-2023-1326: A privilege escalation attack was found in apport-cli 22023-04-13
CVEList
local privilege escalation in apport-cli2023-04-13

📋Vendor Advisories

1
Ubuntu
Apport vulnerability2023-04-13

📄Research Papers

1
CTF
Devvortex / README
CVE-2023-1326 (HIGH CVSS 7.8) | A privilege escalation attack was f | cvebase.io