Categories: Cyber Security News

Pardus Linux Local Privilege Escalation Flaw Allows Silent Root Access

A critical vulnerability chain affecting Pardus Linux has been disclosed, allowing local users to gain full root privileges without authentication.

The issue, assigned a CVSS v3.1 score of 9.3, impacts the pardus-update package, a core component responsible for system updates in the Debian-based distribution maintained by TÜBİTAK.

Pardus is widely deployed across government institutions, educational environments, and enterprise systems in Turkey, making this flaw particularly significant in shared and multi-user environments.

Security researcher Çağrı Eser (0xc4gr1) identified that the issue is not a single bug, but a combination of three weaknesses that together enable complete system compromise.

These include a PolicyKit (Polkit) misconfiguration, a carriage return-line feed (CRLF) injection flaw, and an untrusted file path vulnerability.

Pardus Linux Privilege Escalation Flaw

The first issue lies in the Polkit policy configuration. Critical update actions, such as aptupdateaction and autoaptupgradeaction, were configured with “allow_any=yes,” allowing any user to execute privileged operations without authentication.

This effectively grants passwordless root execution of backend Python scripts via pkexec.

The second flaw exists in the SystemSettingsWrite.py script, which writes user-controlled input into a configuration file.

While newline characters are filtered, carriage return characters are not. This allows attackers to inject arbitrary configuration entries into /etc/pardus/pardus-update.conf.

By crafting a malicious input, attackers can insert a custom APT source path pointing to a file under their control.

The third issue arises in AutoAptUpgrade.py, which processes the manipulated configuration.

The script blindly copies attacker-supplied APT source files into /etc/apt/sources.list.d/ without validation. This enables attackers to introduce a malicious repository and trigger package installation as root.

In a proof-of-concept exploit, an attacker creates a rogue APT repository containing a malicious .deb package.

During installation, the package sets the SUID bit on /bin/bash, allowing privilege escalation.

Once executed, the attacker gains an instant root shell using “/bin/bash -p,” achieving full system compromise.

The impact is severe. Attackers gain unrestricted access to sensitive files such as /etc/shadow, can install persistent backdoors, modify system binaries, and fully control the system.

The vulnerability requires only local access and no user interaction, making it highly exploitable in shared systems or after initial compromise.

To mitigate the issue, administrators must apply three key fixes. First, update the Polkit policy to require administrator authentication instead of allowing unrestricted access.

Second, sanitize all user input in SystemSettingsWrite.py to remove carriage returns and newlines.

Third, restrict APT source file paths in AutoAptUpgrade.py to trusted directories and block world-writable locations.

According to a report by nullsecurityx, the vulnerability chain demonstrates how multiple seemingly minor low-level misconfigurations can escalate into a critical security compromise.

Organizations using Pardus Linux are strongly advised to implement these fixes immediately to prevent exploitation.

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Pardus Linux Local Privilege Escalation Flaw Allows Silent Root Access appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Odyssey’s Runtime Has Been Revealed and It’s One of Christopher Nolan’s Longest Films

Christopher Nolan's The Odyssey won't be three hours long... but it will be pretty dang…

43 minutes ago

The Recertified Sonos Memorial Day Sale Is Now Live, With Huge Savings on Subs, Speakers, and Soundbars

The Recertified Sonos Memorial Day Sale is now live and will run through Memorial Day,…

43 minutes ago

Star Wars: What Is the Future of the Mando-Verse After The Mandalorian and Grogu?

Warning: This article contains full spoilers for The Mandalorian and Grogu!The Mandalorian and Grogu has…

44 minutes ago

Hackers Use Fake Microsoft Teams Downloads to Deploy ValleyRAT Malware

Hackers have been caught running a deceptive campaign that uses fake Microsoft Teams download websites…

1 hour ago

TamperedChef Malware Uses Signed Productivity Apps to Deliver Stealers and RATs

A new wave of malware disguised as everyday productivity tools has been quietly spreading across…

1 hour ago

Fake Invitation Phishing Campaign Targets U.S. Organizations With Credential Theft

A large-scale phishing campaign is actively targeting U.S. organizations, using fake event invitations as bait…

1 hour ago

This website uses cookies.