### [CVE-2012-10022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10022) ![](https://img.shields.io/static/v1?label=Product&message=Kloxo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brightgreen) ### Description Kloxo versions 6.1.12 and earlier contain two setuid root binaries—lxsuexec and lxrestart—that allow local privilege escalation from uid 48. The lxsuexec binary performs a uid check and permits execution of arbitrary commands as root if the invoking user matches uid 48. This flaw enables attackers with Apache-level access to escalate privileges to root without authentication. ### POC #### Reference - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/local/kloxo_lxsuexec.rb - https://www.exploit-db.com/exploits/25406 - https://www.vulncheck.com/advisories/kloxo-local-priv-esc #### Github No PoCs found on GitHub currently.