CVE-2022-38060
Python vulnerability analysis and mitigation

Overview

A privilege escalation vulnerability (CVE-2022-38060) was discovered in the sudo functionality of OpenStack Kolla git master 05194e7618. The vulnerability was disclosed on August 11, 2022, and a patch was released on December 9, 2022. The issue stems from a misconfiguration in /etc/sudoers within a container that can lead to increased privileges (Talos).

Technical details

The vulnerability exists due to a misconfiguration in the sudoers policy that allows users in the kolla group to modify environment variables without a securepath option enforcing trusted PATH environment variables. The CVSSv3 score is 8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity. The vulnerability is classified under CWE-269 (Improper Privilege Management). Two Kolla-provided scripts are exploitable: kollacopycacerts and kollasetconfigs, which can be manipulated through PATH environment variables to execute arbitrary commands as root ([Talos](https://talosintelligence.com/vulnerabilityreports/TALOS-2022-1589)).

Impact

The vulnerability allows unprivileged users to escalate their privileges to root within the container. In cases where containers (e.g., novaapi) are privileged, the root access inside the container may lead to root privilege on the container host itself, potentially compromising the entire system ([Talos](https://talosintelligence.com/vulnerabilityreports/TALOS-2022-1589)).

Mitigation and workarounds

The recommended mitigation includes using the securepath option in /etc/sudoers within the container to prevent PATH environment variable modification. Additionally, the setenv option should be removed from /etc/sudoers, and envkeep should be used for safe environment variables. To prevent container compromises from resulting in host compromise, privileged containers should be avoided in favor of adding individual capabilities as needed (Talos).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 11, 2025
CVE-2025-13780CRITICAL9.1
  • PythonPython
  • pgadmin4
NoYesDec 11, 2025
CVE-2025-67644HIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 11, 2025
CVE-2025-67720MEDIUM6.5
  • PythonPython
  • pyrofork
NoYesDec 11, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management