CVE-2021-31155
Description
Failure to normalize the umask in please before 0.4 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Failure to normalize the umask in please before 0.4 allows a local attacker with limited command execution to gain full root privileges.
Vulnerability
In pleaser versions before 0.4, the umask is not normalized when executing commands as root. This flaw, identified as CVE-2021-31155, allows a local attacker who is authorized to run at least one command via please to escalate privileges to root. The issue exists in the setuid-root binary please and affects all releases prior to 0.4 [1][3].
Exploitation
A local attacker with permission to execute a command via please can exploit the umask handling flaw. By setting a restrictive umask beforehand, the attacker can cause files created by the privileged command to have insecure permissions (e.g., world-writable). The attacker does not need any special authentication beyond being allowed to run a command; they only need local system access and the ability to influence the process environment [1].
Impact
Successful exploitation allows the attacker to gain full root privileges. By manipulating the umask, the attacker can achieve local privilege escalation, compromising the confidentiality, integrity, and availability of the system. The CVSS score is 7.8 (HIGH) with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H [2][3].
Mitigation
The vulnerability is fixed in version 0.4 of pleaser. Users should update to >=0.4 as soon as possible. There is no known workaround for this issue [1][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
pleasercrates.io | < 0.4.0 | 0.4.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-vc5p-j8vw-mc6xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-31155ghsaADVISORY
- crates.io/crates/pleaserghsaWEB
- gitlab.com/edneville/please/-/tree/master/src/binghsax_refsource_MISCWEB
- rustsec.org/advisories/RUSTSEC-2021-0101.htmlghsaWEB
- www.openwall.com/lists/oss-security/2021/05/18/1ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.