目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-32463 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
从非可信控制范围包含功能例程
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Sudo 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Sudo projectSudo 1.9.14 ~ 1.9.17p1 -
二、漏洞 CVE-2025-32463 的公开POC
#POC 描述源链接神龙链接
1Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463https://github.com/pr0v3rbs/CVE-2025-32463_chwootPOC详情
2Nonehttps://github.com/4f-kira/CVE-2025-32463POC详情
3CVE-2025-32463 Proof of concepthttps://github.com/K1tt3h/CVE-2025-32463-POCPOC详情
4Nonehttps://github.com/Adonijah01/cve-2025-32463-labPOC详情
5Nonehttps://github.com/SysMancer/CVE-2025-32463POC详情
6Local Privilege Escalation to Root via Sudo chroot in Linuxhttps://github.com/kh4sh3i/CVE-2025-32463POC详情
7Nonehttps://github.com/neko205-mx/CVE-2025-32463_ExploitPOC详情
8Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) https://github.com/pevinkumar10/CVE-2025-32463POC详情
9Nonehttps://github.com/zhaduchanhzz/CVE-2025-32463_POCPOC详情
10Nonehttps://github.com/robbert1978/CVE-2025-32463_POCPOC详情
11Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell)https://github.com/Mikivirus0/sudoinjectionPOC详情
12Sudo chroot privileged escalation PoChttps://github.com/nflatrea/CVE-2025-32463POC详情
13Nonehttps://github.com/san8383/CVE-2025-32463POC详情
14Nonehttps://github.com/0xAkarii/CVE-2025-32463POC详情
15Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.https://github.com/CIA911/sudo_patch_CVE-2025-32463POC详情
16PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerabilityhttps://github.com/mirchr/CVE-2025-32463-sudo-chwootPOC详情
17Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment.https://github.com/ill-deed/CVE-2025-32463_illdeedPOC详情
18# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .sohttps://github.com/zinzloun/CVE-2025-32463POC详情
19Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒https://github.com/yeremeu/CVE-2025-32463_chwootPOC详情
20🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only.https://github.com/cyberpoul/CVE-2025-32463-POCPOC详情
21CVE-2025-32463https://github.com/B1ack4sh/Blackash-CVE-2025-32463POC详情
22Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨https://github.com/SkylerMC/CVE-2025-32463POC详情
23Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17https://github.com/junxian428/CVE-2025-32463POC详情
24Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.https://github.com/FreeDurok/CVE-2025-32463-PoCPOC详情
25Nonehttps://github.com/Chocapikk/CVE-2025-32463-labPOC详情
26A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalationhttps://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOITPOC详情
27# cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linuxhttps://github.com/SpongeBob-369/cve-2025-32463POC详情
28Nonehttps://github.com/lowercasenumbers/CVE-2025-32463_sudo_chrootPOC详情
29PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments.https://github.com/abrewer251/CVE-2025-32463_Sudo_PoCPOC详情
30Nonehttps://github.com/0xb0rn3/CVE-2025-32463-EXPLOITPOC详情
31Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc)https://github.com/morgenm/sudo-chroot-CVE-2025-32463POC详情
32Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/MohamedKarrab/CVE-2025-32463POC详情
33Educational Docker lab to simulate privilege escalation via CVE-2025-32463https://github.com/dbarquero/cve-2025-32463-labPOC详情
34CVE-2025-32463 漏洞概念验证https://github.com/9Insomnie/CVE-2025-32463POC详情
35Nonehttps://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POCPOC详情
36Nonehttps://github.com/Floodnut/CVE-2025-32463POC详情
37Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻https://github.com/92gmuz/CVE-2025-32463POC详情
38This is the exploit for the CVE-2025-32463https://github.com/Rajneeshkarya/CVE-2025-32463POC详情
39Local Privilege Escalation to Root via Sudo chroot in Linux https://github.com/MGunturG/CVE-2025-32463POC详情
40End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis.https://github.com/IC3-512/linux-root-kitPOC详情
41Nonehttps://github.com/daryllundy/CVE-2025-32463POC详情
42A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions.https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462POC详情
43CVE-2025-32463https://github.com/ChetanKomal/sudo_exploitPOC详情
44CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploithttps://github.com/KaiHT-Ladiant/CVE-2025-32463POC详情
45本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。https://github.com/y4ney/CVE-2025-32463-labPOC详情
46Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf).https://github.com/aldoClau98/CVE-2025-32463POC详情
47Nonehttps://github.com/painoob/CVE-2025-32463POC详情
48This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access.https://github.com/Nowafen/CVE-2025-32463POC详情
49POC for CVE-2025-32463 sudo_chwoothttps://github.com/Yuy0ung/CVE-2025-32463_chwootPOC详情
50Nonehttps://github.com/hacieda/CVE-2025-32463POC详情
51Nonehttps://github.com/blackcat4347/CVE-2025-32463_PoCPOC详情
52🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.https://github.com/ashardev002/CVE-2025-32463_chwootPOC详情
53Nonehttps://github.com/mihnasdsad/CVE-2025-32463POC详情
54Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.https://github.com/At0mXploit/CVE-2025-32463POC详情
55🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads.https://github.com/no-speech-to-text/CVE-2025-32463POC详情
56🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis.https://github.com/DaadaAyoze/CVE-2025-32463-labPOC详情
57This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation.https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-EscapePOC详情
58Nonehttps://github.com/7r00t/cve-2025-32463-labPOC详情
59A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses /etc/nsswitch.conf from a user-controlled directory.https://github.com/AC8999/CVE-2025-32463POC详情
60Nonehttps://github.com/onniio/CVE-2025-32463POC详情
61# CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .sohttps://github.com/khoazero123/CVE-2025-32463POC详情
62This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17)https://github.com/r3dBust3r/CVE-2025-32463POC详情
63sudo --chroot exploithttps://github.com/0x3c4dfa1/CVE-2025-32463POC详情
64Enviroment and Nuclei template to test CVE-2025-32463https://github.com/ricardomaia/CVE-2025-32463POC详情
65- Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option.https://github.com/shazed-x/CVE-2025-32463POC详情
66Nonehttps://github.com/cybershaolin47/CVE-2025-32463_POCPOC详情
67Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/cyberajju/CVE-2025-32463POC详情
68Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Pythonhttps://github.com/dr4x-c0d3r/sudo-chrootPOC详情
69Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Pythonhttps://github.com/dr4xp/sudo-chrootPOC详情
70Nonehttps://github.com/robbin0919/CVE-2025-32463POC详情
71CVE‑2025‑32463https://github.com/DensuLabs/CVE-2025-32463POC详情
72This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation.https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-EscapePOC详情
73Technical examination of CVE-2025-32463 by Muhammed Kaya. https://github.com/muhammedkayag/CVE-2025-32463POC详情
74exploithttps://github.com/NewComrade12211/CVE-2025-32463POC详情
75Nonehttps://github.com/Ghstxz/CVE-2025-32463POC详情
76Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-EscalationPOC详情
77Chroot Privilege Escalationhttps://github.com/justjoeyking/CVE-2025-32463POC详情
78CVE-2025-32463https://github.com/Ashwesker/Blackash-CVE-2025-32463POC详情
79Privilege escalation to root using sudo chroot, NO NEED for gcc installed.https://github.com/cybertechajju/CVE-2025-32463POC详情
80Nonehttps://github.com/Mr-Alperen/CVE-2025-32463POC详情
81CVE-2025-32463https://github.com/Ashwesker/Ashwesker-CVE-2025-32463POC详情
82Nonehttps://github.com/aexdyhaxor/CVE-2025-32463POC详情
83Proof of Concept (PoC) Escalada de privilegios por versión de Sudo.https://github.com/wvverez/CVE-2025-32463POC详情
84🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only.https://github.com/0p5cur/CVE-2025-32463-POCPOC详情
85CVE-2025-32463https://github.com/gmh5225/Blackash-CVE-2025-32463POC详情
86CVE-2025-32463https://github.com/SpycioKon/CVE-2025-32463POC详情
87C reimplementation of chwoot PoChttps://github.com/vpr-labs/CVE-2025-32463POC详情
88Nonehttps://github.com/danilo1992-sys/CVE-2025-32463POC详情
89Sudo before 1.9.17p1 allows local users to obtain root access by using /etc/nsswitch.conf from a user-controlled directory with the --chroot (-R) option. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-32463.yamlPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-32463 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-32463
匿名用户
2026-01-15 06:08:53

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论