sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 12 May 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 12 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability. | |
Title | sudo-rs Allows Low Privilege Users to Discover the Existence of Files in Inaccessible Folders | |
Weaknesses | CWE-497 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-12T14:52:55.408Z
Updated: 2025-05-12T22:06:55.312Z
Reserved: 2025-04-28T20:56:09.083Z
Link: CVE-2025-46717

Updated: 2025-05-12T21:46:30.657Z

Status : Awaiting Analysis
Published: 2025-05-12T15:16:01.260
Modified: 2025-05-12T22:15:26.957
Link: CVE-2025-46717

No data.