Vulnerability Description
please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Edneville | Please | <= 0.5.4 |
Related Weaknesses (CWE)
References
- https://github.com/rustsec/advisory-db/pull/1798Issue TrackingPatch
- https://gitlab.com/edneville/please/-/issues/13ExploitIssue Tracking
- https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575Issue TrackingPatch
- https://rustsec.org/advisories/RUSTSEC-2023-0066.htmlThird Party Advisory
- https://github.com/rustsec/advisory-db/pull/1798Issue TrackingPatch
- https://gitlab.com/edneville/please/-/issues/13ExploitIssue Tracking
- https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575Issue TrackingPatch
- https://rustsec.org/advisories/RUSTSEC-2023-0066.htmlThird Party Advisory
FAQ
What is CVE-2023-46277?
CVE-2023-46277 is a vulnerability with a CVSS score of 7.8 (HIGH). please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)
How severe is CVE-2023-46277?
CVE-2023-46277 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46277?
Check the references section above for vendor advisories and patch information. Affected products include: Edneville Please.