Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
CVSS
No CVSS.
References
Configurations
No configuration.
History
06 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb - | |
References | () https://web.archive.org/web/20121122063935/http://roothackers.net/showthread.php?tid=92 - | |
References | () https://www.exploit-db.com/exploits/25406 - |
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 21:15
Updated : 2025-08-06 14:15
NVD link : CVE-2012-10022
Mitre link : CVE-2012-10022
CVE.ORG link : CVE-2012-10022
JSON object : View
Products Affected
No product.
CWE
CWE-269
Improper Privilege Management