The sudo helper in the HashiCorp Vagrant VMware Fusion plugin (aka vagrant-vmware-fusion) before 4.0.21 allows local users to gain root privileges by leveraging failure to verify the path to the encoded ruby script or scrub the PATH variable.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2017/Jul/29 | mailing list exploit third party advisory |
https://github.com/hashicorp/vagrant-plugin-changelog/blob/master/vagrant-vmware-changelog.md | third party advisory release notes |
https://www.exploit-db.com/exploits/42334/ | exploit vdb entry third party advisory |
https://m4.rkw.io/blog/cve20177642-local-root-privesc-in-hashicorp-vagrantvmwarefusion--4020.html | third party advisory exploit |