一、 漏洞 CVE-2025-32463 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
Sudo版本在1.9.17p1之前存在漏洞,本地用户可以利用该漏洞获取root权限。这是因为使用`--chroot`选项时,会从用户控制的目录中读取`/etc/nsswitch.conf`文件。

## 影响版本
- Sudo 版本低于 1.9.17p1

## 漏洞细节
本地用户可以通过修改位于用户控制目录中的`/etc/nsswitch.conf`文件,并结合`--chroot`选项,绕过正常的权限检查机制。这个改动会导致Sudo程序执行时使用了恶意构造的`/etc/nsswitch.conf`文件,从而使得攻击者可以提升权限至root。

## 影响
- 允许本地用户获取root访问权限,进而控制系统。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
从非可信控制范围包含功能例程
来源:美国国家漏洞数据库 NVD
漏洞标题
Sudo 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-32463 的公开POC
# POC 描述 源链接 神龙链接
1 Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 https://github.com/pr0v3rbs/CVE-2025-32463_chwoot POC详情
2 None https://github.com/4f-kira/CVE-2025-32463 POC详情
3 CVE-2025-32463 Proof of concept https://github.com/K1tt3h/CVE-2025-32463-POC POC详情
4 None https://github.com/Adonijah01/cve-2025-32463-lab POC详情
5 None https://github.com/SysMancer/CVE-2025-32463 POC详情
6 Local Privilege Escalation to Root via Sudo chroot in Linux https://github.com/kh4sh3i/CVE-2025-32463 POC详情
7 None https://github.com/neko205-mx/CVE-2025-32463_Exploit POC详情
8 Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) https://github.com/pevinkumar10/CVE-2025-32463 POC详情
9 None https://github.com/zhaduchanhzz/CVE-2025-32463_POC POC详情
10 None https://github.com/robbert1978/CVE-2025-32463_POC POC详情
11 Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) https://github.com/Mikivirus0/sudoinjection POC详情
12 Sudo chroot privileged escalation PoC https://github.com/nflatrea/CVE-2025-32463 POC详情
13 None https://github.com/san8383/CVE-2025-32463 POC详情
14 None https://github.com/0xAkarii/CVE-2025-32463 POC详情
15 Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL. https://github.com/CIA911/sudo_patch_CVE-2025-32463 POC详情
16 PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability https://github.com/mirchr/CVE-2025-32463-sudo-chwoot POC详情
17 Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment. https://github.com/ill-deed/CVE-2025-32463_illdeed POC详情
18 # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so https://github.com/zinzloun/CVE-2025-32463 POC详情
19 Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 https://github.com/yeremeu/CVE-2025-32463_chwoot POC详情
20 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. https://github.com/cyberpoul/CVE-2025-32463-POC POC详情
21 CVE-2025-32463 https://github.com/B1ack4sh/Blackash-CVE-2025-32463 POC详情
22 Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ https://github.com/SkylerMC/CVE-2025-32463 POC详情
23 Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17 https://github.com/junxian428/CVE-2025-32463 POC详情
24 Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. https://github.com/FreeDurok/CVE-2025-32463-PoC POC详情
25 None https://github.com/Chocapikk/CVE-2025-32463-lab POC详情
26 A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalation https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT POC详情
27 # cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linux https://github.com/SpongeBob-369/cve-2025-32463 POC详情
28 None https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot POC详情
29 PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments. https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC POC详情
30 None https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT POC详情
31 Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) https://github.com/morgenm/sudo-chroot-CVE-2025-32463 POC详情
32 Privilege escalation to root using sudo chroot, NO NEED for gcc installed. https://github.com/MohamedKarrab/CVE-2025-32463 POC详情
33 Educational Docker lab to simulate privilege escalation via CVE-2025-32463 https://github.com/dbarquero/cve-2025-32463-lab POC详情
34 CVE-2025-32463 漏洞概念验证 https://github.com/9Insomnie/CVE-2025-32463 POC详情
35 None https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC POC详情
36 None https://github.com/Floodnut/CVE-2025-32463 POC详情
37 Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻 https://github.com/92gmuz/CVE-2025-32463 POC详情
38 This is the exploit for the CVE-2025-32463 https://github.com/Rajneeshkarya/CVE-2025-32463 POC详情
39 Local Privilege Escalation to Root via Sudo chroot in Linux https://github.com/MGunturG/CVE-2025-32463 POC详情
40 End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis. https://github.com/IC3-512/linux-root-kit POC详情
41 None https://github.com/daryllundy/CVE-2025-32463 POC详情
42 A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions. https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462 POC详情
43 CVE-2025-32463 https://github.com/ChetanKomal/sudo_exploit POC详情
44 CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit https://github.com/KaiHT-Ladiant/CVE-2025-32463 POC详情
45 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 https://github.com/y4ney/CVE-2025-32463-lab POC详情
46 Questo script è un proof of concept (PoC) che dimostra una tecnica di privilege escalation (Elevazione di privilegi) sfruttando una vulnerabilità teorica di sudo (es. CVE-2025-32463). Il PoC forza sudo a caricare una libreria .so manipolata sfruttando la funzionalità -R (chroot) e la configurazione personalizzata di NSS (nsswitch.conf). https://github.com/aldoClau98/CVE-2025-32463 POC详情
47 None https://github.com/painoob/CVE-2025-32463 POC详情
48 This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access. https://github.com/Nowafen/CVE-2025-32463 POC详情
49 POC for CVE-2025-32463 sudo_chwoot https://github.com/Yuy0ung/CVE-2025-32463_chwoot POC详情
50 None https://github.com/hacieda/CVE-2025-32463 POC详情
51 None https://github.com/blackcat4347/CVE-2025-32463_PoC POC详情
52 🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment. https://github.com/ashardev002/CVE-2025-32463_chwoot POC详情
53 None https://github.com/mihnasdsad/CVE-2025-32463 POC详情
54 Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. https://github.com/At0mXploit/CVE-2025-32463 POC详情
55 🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads. https://github.com/no-speech-to-text/CVE-2025-32463 POC详情
56 🐳 Reproduce and test the CVE-2025-32463 vulnerability in a Docker-based lab environment for security research and practical analysis. https://github.com/DaadaAyoze/CVE-2025-32463-lab POC详情
57 This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. https://github.com/nelissandro/CVE-2025-32463-Sudo-Chroot-Escape POC详情
58 None https://github.com/7r00t/cve-2025-32463-lab POC详情
59 A Python exploit for CVE-2025-32463, a critical local privilege escalation vulnerability in the Sudo binary on Linux systems. This flaw allows local users to obtain root access by exploiting the --chroot option, which incorrectly uses /etc/nsswitch.conf from a user-controlled directory. https://github.com/AC8999/CVE-2025-32463 POC详情
60 None https://github.com/onniio/CVE-2025-32463 POC详情
61 # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so https://github.com/khoazero123/CVE-2025-32463 POC详情
62 This repository contains an exploit script for CVE-2025-32463, a local privilege escalation involving `chroot` behavior in affected `sudo` versions (1.9.14 through 1.9.17) https://github.com/r3dBust3r/CVE-2025-32463 POC详情
63 sudo --chroot exploit https://github.com/0x3c4dfa1/CVE-2025-32463 POC详情
64 Enviroment and Nuclei template to test CVE-2025-32463 https://github.com/ricardomaia/CVE-2025-32463 POC详情
65 - Vulnerable: sudo 1.9.14, 1.9.15, 1.9.16, 1.9.17 - Patched in: sudo 1.9.17p1 and later - Legacy versions older than 1.9.14 are not affected, as they don't support the --chroot option. https://github.com/shazed-x/CVE-2025-32463 POC详情
66 None https://github.com/cybershaolin47/CVE-2025-32463_POC POC详情
67 Privilege escalation to root using sudo chroot, NO NEED for gcc installed. https://github.com/cyberajju/CVE-2025-32463 POC详情
68 Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python https://github.com/dr4x-c0d3r/sudo-chroot POC详情
69 Sudo Vulnerability Local PrivEsc (CVE-2025-32463) POC with Python https://github.com/dr4xp/sudo-chroot POC详情
70 None https://github.com/robbin0919/CVE-2025-32463 POC详情
71 CVE‑2025‑32463 https://github.com/DensuLabs/CVE-2025-32463 POC详情
72 This repository contains a Proof of Concept (PoC) for CVE-2025-32463, a vulnerability in sudo allowing a chroot escape to achieve local privilege escalation. https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape POC详情
73 Technical examination of CVE-2025-32463 by Muhammed Kaya. https://github.com/muhammedkayag/CVE-2025-32463 POC详情
三、漏洞 CVE-2025-32463 的情报信息
四、漏洞 CVE-2025-32463 的评论

暂无评论


发表评论