CVE Vulnerabilities

CVE-2023-29383

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Apr 14, 2023 | Modified: Apr 24, 2023
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that cat /etc/passwd shows a rogue user account.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Shadow Shadow_project 4.13 (including) 4.13 (including)
Shadow Ubuntu bionic *
Shadow Ubuntu esm-infra-legacy/trusty *
Shadow Ubuntu esm-infra/bionic *
Shadow Ubuntu esm-infra/xenial *
Shadow Ubuntu focal *
Shadow Ubuntu jammy *
Shadow Ubuntu kinetic *
Shadow Ubuntu lunar *
Shadow Ubuntu mantic *
Shadow Ubuntu trusty *
Shadow Ubuntu trusty/esm *
Shadow Ubuntu upstream *
Shadow Ubuntu xenial *

Potential Mitigations

References