Jan 1, 2026·6 min read·11 visits
The command-line tool `theshit` loads custom Python rule files from the user's configuration directory. Prior to version 0.1.1, it failed to verify file ownership when running with elevated privileges (e.g., via `sudo`). An attacker can place a malicious Python script in their own config folder, wait for an administrator to run the tool to fix a command, and achieve immediate root code execution.
A classic Local Privilege Escalation (LPE) in the 'theshit' command correction utility, allowing unprivileged users to execute arbitrary Python code as root due to unsafe loading of user configuration files.
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
theshit AsfhtgkDavid | < 0.1.1 | 0.1.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-269 |
| Attack Vector | Local (AV:L) |
| CVSS | 6.7 (Medium) |
| Impact | Privilege Escalation (Root) |
| Component | Python Rule Loader |
| Exploit Status | High Probability / Trivial |
Improper Privilege Management