sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.
History

Mon, 12 May 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 15:00:00 +0000

Type Values Removed Values Added
Description sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.
Title sudo-rs Allows Low Privilege Users to Discover the Existence of Files in Inaccessible Folders
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-12T14:52:55.408Z

Updated: 2025-05-12T22:06:55.312Z

Reserved: 2025-04-28T20:56:09.083Z

Link: CVE-2025-46717

cve-icon Vulnrichment

Updated: 2025-05-12T21:46:30.657Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-12T15:16:01.260

Modified: 2025-05-12T22:15:26.957

Link: CVE-2025-46717

cve-icon Redhat

No data.