CVE Vulnerabilities

CVE-2023-29383

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Apr 14, 2023 | Modified: Nov 03, 2025
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that cat /etc/passwd shows a rogue user account.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
ShadowShadow_project4.13 (including)4.13 (including)
ShadowUbuntubionic*
ShadowUbuntuesm-infra-legacy/trusty*
ShadowUbuntuesm-infra/bionic*
ShadowUbuntuesm-infra/focal*
ShadowUbuntuesm-infra/xenial*
ShadowUbuntufocal*
ShadowUbuntujammy*
ShadowUbuntukinetic*
ShadowUbuntulunar*
ShadowUbuntumantic*
ShadowUbuntutrusty*
ShadowUbuntutrusty/esm*
ShadowUbuntuupstream*
ShadowUbuntuxenial*

Potential Mitigations

References