please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://gitlab.com/edneville/please/-/issues/13 | issue tracking exploit |
https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575 | patch issue tracking |
https://github.com/rustsec/advisory-db/pull/1798 | patch issue tracking |
https://rustsec.org/advisories/RUSTSEC-2023-0066.html | third party advisory |