In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
- https://github.com/shadow-maint/shadow/pull/687
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/Jidendiran-coder/trivy-grafana-alert-system
- https://github.com/Myash-New/05-virt-04-docker-in-practice
- https://github.com/OzNetNerd/CheckovOutputProcessor
- https://github.com/Telooss/TP-WIK-DPS-TP02
- https://github.com/XXRadeonXFX/trivy-grafana-ai-alert-automation
- https://github.com/adegoodyer/kubernetes-admin-toolkit
- https://github.com/drewtwitchell/scancompare
- https://github.com/fokypoky/places-list
- https://github.com/mmbazm/secure_license_server
- https://github.com/poikl246/DevSecOps-2024-v2
- https://github.com/thirumalai-py/trivy-grafana-ai-alert
- https://github.com/tl87/container-scanner