{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T03:57:29.499","vulnerabilities":[{"cve":{"id":"CVE-2023-1521","sourceIdentifier":"security@mozilla.org","published":"2024-11-26T12:15:18.203","lastModified":"2025-10-15T17:49:00.243","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"On Linux the sccache client can execute arbitrary code with the privileges of a local sccache server, by preloading the code in a shared library passed to LD_PRELOAD.\n\n\nIf the server is run as root (which is the default when installing the  snap package https://snapcraft.io/sccache ), this means a user running the sccache client can get root privileges."},{"lang":"es","value":"En Linux, el cliente sccache puede ejecutar código arbitrario con los privilegios de un servidor sccache local, precargando el código en una biblioteca compartida que se pasa a LD_PRELOAD. Si el servidor se ejecuta como superusuario (que es el valor predeterminado al instalar el paquete snap https://snapcraft.io/sccache ), esto significa que un usuario que ejecuta el cliente sccache puede obtener privilegios de superusuario."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@mozilla.org","type":"Secondary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:sccache:*:*:*:*:*:rust:*:*","versionEndExcluding":"0.4.0","matchCriteriaId":"C6BEED6E-028D-450C-9DAE-F40F22B5F546"}]}]}],"references":[{"url":"https://github.com/advisories/GHSA-x7fr-pg8f-93f5","source":"security@mozilla.org","tags":["Third Party Advisory"]},{"url":"https://securitylab.github.com/advisories/GHSL-2023-046_ScCache","source":"security@mozilla.org","tags":["Exploit"]}]}}]}