VYPR
Low severityNVD Advisory· Published May 12, 2025· Updated May 12, 2025

sudo-rs Allows Low Privilege Users to Discover the Existence of Files in Inaccessible Folders

CVE-2025-46717

Description

sudo-rs is a memory safe implementation of sudo and su written in Rust. Prior to version 0.2.6, users with no (or very limited) sudo privileges can determine whether files exists in folders that they otherwise cannot access using sudo --list . Users with local access to a machine can discover the existence/non-existence of certain files, revealing potentially sensitive information in the file names. This information can also be used in conjunction with other attacks. Version 0.2.6 fixes the vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

sudo-rs before 0.2.6 lets low-privileged users detect file existence in otherwise inaccessible directories via `sudo --list`.

A vulnerability in sudo-rs, a memory-safe implementation of sudo and su written in Rust, allows local users with no or very limited sudo privileges to determine whether specific files exist in directories they cannot otherwise access. The bug resides in the sudo --list command, which returns different error messages depending on whether the specified file exists, even when the user lacks read or execute permissions on the containing directory [2][4].

To exploit this, a local attacker simply runs sudo --list with a target path. If the file does not exist, the tool returns a "command not found" error; if the file exists, the user receives a message stating they are not permitted to run the command. No authentication or elevation is required beyond minimal sudo-rs access, making the attack trivial for any user with a local shell [4]. The issue affects all versions prior to 0.2.6.

The impact is information disclosure: an attacker can map file existence in protected folders, potentially revealing sensitive file names that hint at system configuration, monitoring scripts, or secret data. This information can also be combined with other attack vectors, such as race conditions or privilege escalation attempts [2].

Version 0.2.6 fixes the vulnerability by altering the behavior of --list to perform additional checking before reporting errors, ensuring that the existence of a file is not leaked through differing response messages [3]. Users should update to 0.2.6 or later; the advisory notes that the original sudo exhibited similar behavior in some configurations [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
sudo-rscrates.io
< 0.2.60.2.6

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.