We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46717

sudo-rs Allows Low Privilege Users to Discover the Existence of Files in Inaccessible Folders



Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using `sudo --list <pathname>`. Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.

Reserved 2025-04-28 | Published 2025-05-12 | Updated 2025-05-12 | Assigner GitHub_M


LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

< 0.2.6
affected

References

github.com/...udo-rs/security/advisories/GHSA-98cv-wqjx-wx8f

github.com/...ectatechfoundation/sudo-rs/releases/tag/v0.2.6

cve.org (CVE-2025-46717)

nvd.nist.gov (CVE-2025-46717)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46717

Support options

Helpdesk Chat, Email, Knowledgebase