The issue, assigned a CVSS v3.1 score of 9.3, impacts the pardus-update package, a core component responsible for system updates in the Debian-based distribution maintained by TÜBİTAK.
Pardus is widely deployed across government institutions, educational environments, and enterprise systems in Turkey, making this flaw particularly significant in shared and multi-user environments.
Security researcher Çağrı Eser (0xc4gr1) identified that the issue is not a single bug, but a combination of three weaknesses that together enable complete system compromise.
These include a PolicyKit (Polkit) misconfiguration, a carriage return-line feed (CRLF) injection flaw, and an untrusted file path vulnerability.
The first issue lies in the Polkit policy configuration. Critical update actions, such as aptupdateaction and autoaptupgradeaction, were configured with “allow_any=yes,” allowing any user to execute privileged operations without authentication.
This effectively grants passwordless root execution of backend Python scripts via pkexec.
The second flaw exists in the SystemSettingsWrite.py script, which writes user-controlled input into a configuration file.
While newline characters are filtered, carriage return characters are not. This allows attackers to inject arbitrary configuration entries into /etc/pardus/pardus-update.conf.
By crafting a malicious input, attackers can insert a custom APT source path pointing to a file under their control.
The third issue arises in AutoAptUpgrade.py, which processes the manipulated configuration.
The script blindly copies attacker-supplied APT source files into /etc/apt/sources.list.d/ without validation. This enables attackers to introduce a malicious repository and trigger package installation as root.
In a proof-of-concept exploit, an attacker creates a rogue APT repository containing a malicious .deb package.
During installation, the package sets the SUID bit on /bin/bash, allowing privilege escalation.
Once executed, the attacker gains an instant root shell using “/bin/bash -p,” achieving full system compromise.
The impact is severe. Attackers gain unrestricted access to sensitive files such as /etc/shadow, can install persistent backdoors, modify system binaries, and fully control the system.
The vulnerability requires only local access and no user interaction, making it highly exploitable in shared systems or after initial compromise.
To mitigate the issue, administrators must apply three key fixes. First, update the Polkit policy to require administrator authentication instead of allowing unrestricted access.
Second, sanitize all user input in SystemSettingsWrite.py to remove carriage returns and newlines.
Third, restrict APT source file paths in AutoAptUpgrade.py to trusted directories and block world-writable locations.
According to a report by nullsecurityx, the vulnerability chain demonstrates how multiple seemingly minor low-level misconfigurations can escalate into a critical security compromise.
Organizations using Pardus Linux are strongly advised to implement these fixes immediately to prevent exploitation.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Pardus Linux Local Privilege Escalation Flaw Allows Silent Root Access appeared first on Cyber Security News.
Christopher Nolan's The Odyssey won't be three hours long... but it will be pretty dang…
The Recertified Sonos Memorial Day Sale is now live and will run through Memorial Day,…
Warning: This article contains full spoilers for The Mandalorian and Grogu!The Mandalorian and Grogu has…
Hackers have been caught running a deceptive campaign that uses fake Microsoft Teams download websites…
A new wave of malware disguised as everyday productivity tools has been quietly spreading across…
A large-scale phishing campaign is actively targeting U.S. organizations, using fake event invitations as bait…
This website uses cookies.