# N/A
## 漏洞概述
在使用特定配置的sudoers文件时,Sudo版本早于1.9.17p1允许列出的用户在无意指定的主机上执行命令。
## 影响版本
- 早于1.9.17p1的所有Sudo版本
## 细节
当sudoers文件中指定的主机既不是当前主机也不是通配符ALL时,列出的用户可以执行命令在非预期的机器上。
## 影响
此漏洞可能导致未经授权的用户在未指定的主机上执行命令,从而可能引发权限滥用或非法访问。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | POC script for CVE-2025-32462 a vulnerability in sudo | https://github.com/Hacksparo/CVE-2025-32462 | POC详情 |
2 | A easy sudo poc by cryingn. | https://github.com/CryingN/CVE-2025-32462 | POC详情 |
3 | Exploit for CVE-2025-32462 | https://github.com/atomicjjbod/CVE-2025-32462 | POC详情 |
4 | CVE-2025-32462 Exploit | https://github.com/cybersentinelx1/CVE-2025-32462-Exploit | POC详情 |
5 | CVE-2025-32462 exploit code | https://github.com/mylovem313/CVE-2025-32462 | POC详情 |
6 | 🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers | https://github.com/cyberpoul/CVE-2025-32462-POC | POC详情 |
7 | cve-2025-32462' demo | https://github.com/SpongeBob-369/cve-2025-32462 | POC详情 |
8 | Docker PoC for CVE-2025-32462 & CVE-2025-32463 (sudo), based on Stratascale CRU research. | https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab | POC详情 |
9 | Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros | https://github.com/toohau/CVE-2025-32462-32463-Detection-Script- | POC详情 |
10 | The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022 | https://github.com/j3r1ch0123/CVE-2025-32462 | POC详情 |
标题: oss-security - CVE-2025-32462: sudo local privilege escalation via host option -- 🔗来源链接
标签:
神龙速读标题: 959314 – (CVE-2025-32462, CVE-2025-32463) <app-admin/sudo-1.9.17_p1: two local privilege escalation vulnerabilities -- 🔗来源链接
标签:
神龙速读暂无评论