Home / Vulnerability Database / Config files : Excessive Privileges
Config files
Config files : Excessive Privileges
Classification
OWASP Top 10 2017
OWASP Top 10 2021
CWE/SANS Top 25 2011
Overview
When you grant users sudo access by using the sudo command or directly modifying the /etc/sudoers file, you potentially give the running process escalated privileges within the container. If an attacker gains control of the container and manages to execute commands with sudo, they could potentially exploit vulnerabilities to gain access to the host system or manipulate other containers.
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : Excessive Privileges in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
