CVE-2012-10022
Severity CVSS v4.0:
HIGH
Type:
CWE-269
Improper Privilege Management
Publication date:
01/08/2025
Last modified:
06/08/2025
Description
Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://github.com/KloxoNGCommunity/kloxo
- https://kloxo.org/
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb
- https://web.archive.org/web/20121122063935/http://roothackers.net/showthread.php?tid=92
- https://www.exploit-db.com/exploits/25406
- https://www.vulncheck.com/advisories/kloxo-local-priv-esc
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb
- https://web.archive.org/web/20121122063935/http://roothackers.net/showthread.php?tid=92
- https://www.exploit-db.com/exploits/25406



