We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2012-10022

Kloxo <= 6.1.12 Local Privilege Escalation



Description

Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.

Reserved 2025-08-01 | Published 2025-08-01 | Updated 2025-08-01 | Assigner VulnCheck


HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

*
affected

Credits

HTP finder

References

raw.githubusercontent.com/...s/linux/local/kloxo_lxsuexec.rb exploit

www.exploit-db.com/exploits/25406 exploit

web.archive.org/...p://roothackers.net/showthread.php?tid=92 technical-description exploit

kloxo.org/ product

github.com/KloxoNGCommunity/kloxo product

www.vulncheck.com/advisories/kloxo-local-priv-esc third-party-advisory

cve.org (CVE-2012-10022)

nvd.nist.gov (CVE-2012-10022)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2012-10022

Support options

Helpdesk Chat, Email, Knowledgebase