CVE-2012-10022 – Kloxo Setuid Root Privilege Escalation

The following table lists the changes that have been made to the
CVE-2012-10022 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 01, 2025

    Action Type Old Value New Value
    Added Description Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication.
    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-269
    Added Reference https://github.com/KloxoNGCommunity/kloxo
    Added Reference https://kloxo.org/
    Added Reference https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb
    Added Reference https://web.archive.org/web/20121122063935/http://roothackers.net/showthread.php?tid=92
    Added Reference https://www.exploit-db.com/exploits/25406
    Added Reference https://www.vulncheck.com/advisories/kloxo-local-priv-esc
Share the Post:

Related Posts