Member-only story
Recently, a new security vulnerability was discovered and reported by security researchers, named CVE-2023–22809.
In this article, we’ll be discussing the impact, causes, and possible solutions for this security vulnerability.
What is sudo?
Probably you already know, but in case you don’t sudo
is a Unix-based command that stands for “Superuser Do.”
sudo
command allows a user with proper permissions to execute a command as the root (or superuser) user, which is the highest level of access on a Unix-based system.
This means that the user can perform actions and access files and resources that would otherwise be restricted to the root user.
Using sudo
is often necessary when performing system-level tasks, such as installing software or changing system settings. By using sudo
, a user can perform these tasks without logging in as the root user, which is considered a security best practice.
The sudo
command must be used with caution, as it can be potentially harmful if used improperly. For example, a user who executes a command as the root user with sudo
can make changes to the system that could cause it to become unstable or even inoperable.
Let’s get to action
Now that we’ve covered what sudo is we can get into more details about what we can do to exploit the vulnerability.