Skip to content

Commit 583abb0

Browse files
1 parent 9b9b5e4 commit 583abb0

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

advisories/github-reviewed/2026/02/GHSA-gwch-7m8v-7544/GHSA-gwch-7m8v-7544.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gwch-7m8v-7544",
4-
"modified": "2026-02-02T20:25:53Z",
4+
"modified": "2026-02-03T16:01:25Z",
55
"published": "2026-02-02T20:25:53Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-25499"
8+
],
79
"summary": "terraform-provider-proxmox has insecure sudo recommendation in the documentation",
810
"details": "> Note: It is uncertain whether this constitutes a vulnerability or should be filed as an issue instead.\n\n### Summary\n\nIn the SSH configuration documentation, the sudoer line that was suggested can be escalated to edit any files in the system.\n\n### Details\n\nThe following line were suggested for addition in the sudoers file:\n\n```bash\nterraform ALL=(root) NOPASSWD: /usr/bin/tee /var/lib/vz/*\n```\n\nBut this is highly insecure as the folder can be escaped using `../` and any files can be edited on the system.\n\n### PoC\n\nUsing a `terraform` user with the previously mentioned line in the `/etc/sudoers` file, a `/etc/sudoers.d/sudo` file can be added using this command:\n\n`echo \"ALL=(ALL) NOPASSWD:ALL\" | tee /var/lib/vz/../../../etc/sudoers.d/sudo`\n\nThis grants access to the full root of the node.\n\n### Impact\n\nThis breaches the access limits of the Terraform user.\n\n### Suggested workaround\n\nUse a strict regex on the command to allow only the names that should be pushed by this user.\n\nExample for cloudinit yaml files:\n\n```bash\nterraform ALL=(root) NOPASSWD: /usr/bin/tee /var/lib/vz/snippets/[A-Za-z0-9-]*\\\\.yaml\n```",
911
"severity": [],

0 commit comments

Comments
 (0)