CVE-2021-26936
📋 TL;DR
This vulnerability allows a local attacker to escalate privileges to root by manipulating video output paths in ReplaySorcery's default setuid-root configuration. It affects users running ReplaySorcery versions 0.4.0 through 0.5.0 with the default configuration. The attacker must have local access to the system.
💻 Affected Systems
- ReplaySorcery
📦 What is this software?
Replaysorcery by Replaysorcery Project
⚠️ Risk & Real-World Impact
Worst Case
Full root compromise of the system, allowing complete control, data theft, persistence, and lateral movement.
Likely Case
Local privilege escalation to root by authenticated users or attackers with initial access, leading to system compromise.
If Mitigated
No impact if the setuid-root configuration is disabled or the vulnerable version is not installed.
🎯 Exploit Status
Exploitation requires local access and involves specifying malicious video output paths; details are publicly available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.5.1 and later
Vendor Advisory: https://github.com/matanui159/ReplaySorcery/releases
Restart Required: No
Instructions:
1. Update ReplaySorcery to version 0.5.1 or later. 2. Use package manager or download from GitHub releases. 3. Verify the update by checking the version.
🔧 Temporary Workarounds
Disable setuid-root configuration
linuxRemove setuid permissions from the replay-sorcery binary to prevent privilege escalation.
sudo chmod u-s /usr/bin/replay-sorcery
Restrict video output paths
linuxConfigure ReplaySorcery to only allow video output in non-privileged directories.
Edit configuration files to set safe output paths; refer to ReplaySorcery documentation.
🧯 If You Can't Patch
- Remove ReplaySorcery from affected systems entirely.
- Restrict local user access to systems running vulnerable versions.
🔍 How to Verify
Check if Vulnerable:
Check if ReplaySorcery is installed and its version is between 0.4.0 and 0.5.0, and if the replay-sorcery binary has setuid permissions.
Check Version:
replay-sorcery --version
Verify Fix Applied:
Confirm ReplaySorcery version is 0.5.1 or later, and check that setuid permissions are not present or properly configured.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation attempts in system logs (e.g., /var/log/auth.log)
- Execution of replay-sorcery with suspicious output paths.
Network Indicators:
- None - this is a local exploit with no network indicators.
SIEM Query:
Search for events where replay-sorcery is executed with setuid privileges or from unexpected users.