Bypassing sudo noexec restriction via wordexp() vulnerability

Bypassing sudo noexec restriction via wordexp() vulnerability

CVE-2016-7076 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.

Learn more about our User Device Pen Test.