CVE-2023-46277
 
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)
please (también conocido como pleaser) hasta 0.5.4 permite la escalada de privilegios a través de TIOCSTI y/o TIOCLINUX ioctl. (Si tanto TIOCSTI como TIOCLINUX están deshabilitados, esto no se puede explotar).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-10-20 CVE Reserved
- 2023-10-20 CVE Published
- 2023-10-27 EPSS Updated
- 2024-09-12 CVE Updated
- 2024-09-12 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-269: Improper Privilege Management
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://rustsec.org/advisories/RUSTSEC-2023-0066.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://gitlab.com/edneville/please/-/issues/13 | 2024-09-12 |
URL | Date | SRC |
---|---|---|
https://github.com/rustsec/advisory-db/pull/1798 | 2023-10-26 | |
https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575 | 2023-10-26 |
URL | Date | SRC |
---|