Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.4

Linux Tool Fails to Drop Privileges, Allowing Root Access

CVE-2026-21882 GHSA-2j3p-gqw5-g59j
Summary

A common Linux tool can re-run commands with root privileges if the user previously ran the command with elevated access. This allows an attacker to gain full system access if they can trick the tool into re-running a command. If you use this tool with sudo, make sure to update it to the latest version to prevent this issue.

What to do
  • Update theshit to version 0.2.0.
Affected software
VendorProductAffected versionsFix available
– theshit <= 0.2.0 0.2.0
Original title
theshit's Improper Privilege Dropping Allows Local Privilege Escalation via Command Re-execution
Original description
### Impact

**Vulnerability Type:** Local Privilege Escalation (LPE) / Improper Privilege Management / Arbitrary Command Execution.

The application automatically re-executes the previously failed command but does not properly drop elevated privileges during this process.

When the tool is executed with `sudo` or otherwise runs with an effective UID of root, it records the last executed command and attempts to rerun it. However, the application fails to restore the original unprivileged user context before re-executing the command. As a result, the retried command is executed with root privileges, even if the original command was issued by an unprivileged user.

This allows a local attacker to intentionally trigger a failed command under elevated execution and gain arbitrary command execution as root via the retry mechanism.

**Who is impacted:**
Any system where this tool is executed with elevated privileges is affected. The risk is especially high in environments where the tool is permitted to run via `sudo`, including configurations with `NOPASSWD`, as an unprivileged user can escalate privileges to root without additional interaction.

### Proof of Concept

To verify the vulnerability without a shell, attempt to create a file in a root-protected directory.

**1. Verify the file does not exist**
```bash
sudo ls /root/proof_of_lpe
# Output: No such file or directory
```

**2. Run the vulnerable command**
```bash
sudo bash -c "SH_PREV_CMD='touch /root/proof_of_lpe' target/release/theshit fix"
```

**3. Check if the file was created by root**
```bash
sudo ls -l /root/proof_of_lpe
```

**Expected Result:**
The command succeeds silently, and the file `/root/proof_of_lpe` is created, confirming arbitrary command execution with root privileges.

### Patches

The issue has been fixed in version **0.1.2**.

The patch ensures that privilege levels are correctly handled during command re-execution. Before retrying any previously executed command, the application now explicitly resets the effective UID and GID to the original invoking user.

### Workarounds

If upgrading is not possible, users should avoid executing the application with `sudo` or as the root user.

As a temporary mitigation, administrators should restrict the use of the tool in privileged contexts and ensure it is not included in `sudoers` configurations, particularly with `NOPASSWD`. Running the tool strictly as an unprivileged user prevents exploitation of the retry mechanism.

### References

* [Commit fixing the issue](https://github.com/AsfhtgkDavid/theshit/commit/5293957b119e55212dce2c6dcbaf1d7eb794602a)
* CWE-269: Improper Privilege Management
* CWE-273: Improper Check for Dropped Privileges
* CWE-250: Execution with Unnecessary Privileges
nvd CVSS3.1 8.4
Vulnerability type
CWE-250
CWE-269 Improper Privilege Management
CWE-273
Published: 2 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026