# N/A
## 漏洞概述
Sudo版本在1.9.17p1之前存在漏洞,本地用户可以利用该漏洞获取root权限。这是因为使用`--chroot`选项时,会从用户控制的目录中读取`/etc/nsswitch.conf`文件。
## 影响版本
- Sudo 版本低于 1.9.17p1
## 漏洞细节
本地用户可以通过修改位于用户控制目录中的`/etc/nsswitch.conf`文件,并结合`--chroot`选项,绕过正常的权限检查机制。这个改动会导致Sudo程序执行时使用了恶意构造的`/etc/nsswitch.conf`文件,从而使得攻击者可以提升权限至root。
## 影响
- 允许本地用户获取root访问权限,进而控制系统。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 | https://github.com/pr0v3rbs/CVE-2025-32463_chwoot | POC详情 |
2 | None | https://github.com/4f-kira/CVE-2025-32463 | POC详情 |
3 | CVE-2025-32463 Proof of concept | https://github.com/K1tt3h/CVE-2025-32463-POC | POC详情 |
4 | None | https://github.com/Adonijah01/cve-2025-32463-lab | POC详情 |
5 | None | https://github.com/SysMancer/CVE-2025-32463 | POC详情 |
6 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/kh4sh3i/CVE-2025-32463 | POC详情 |
7 | None | https://github.com/neko205-mx/CVE-2025-32463_Exploit | POC详情 |
8 | Exploit for Local Privilege Escalation in Sudo via Malicious nsswitch.conf with sudo -R. (CVE-2025-32463) | https://github.com/pevinkumar10/CVE-2025-32463 | POC详情 |
9 | None | https://github.com/zhaduchanhzz/CVE-2025-32463_POC | POC详情 |
10 | None | https://github.com/robbert1978/CVE-2025-32463_POC | POC详情 |
11 | Sudo Local Privilege Escalation CVE-2025-32463 (Best For Cases Where the shell is not stable to spawn a new root shell) | https://github.com/Mikivirus0/sudoinjection | POC详情 |
12 | Sudo chroot privileged escalation PoC | https://github.com/nflatrea/CVE-2025-32463 | POC详情 |
13 | None | https://github.com/san8383/CVE-2025-32463 | POC详情 |
14 | None | https://github.com/0xAkarii/CVE-2025-32463 | POC详情 |
15 | Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL. | https://github.com/CIA911/sudo_patch_CVE-2025-32463 | POC详情 |
16 | PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability | https://github.com/mirchr/CVE-2025-32463-sudo-chwoot | POC详情 |
17 | Privilege escalation exploit for CVE-2025-32463 using a malicious NSS module injected via sudo -R. This version creates a stealth payload called illdeed, granting root access through a controlled chroot environment. | https://github.com/ill-deed/CVE-2025-32463_illdeed | POC详情 |
18 | # CVE-2025-32463 – Sudo EoP Exploit (PoC) with precompiled .so | https://github.com/zinzloun/CVE-2025-32463 | POC详情 |
19 | Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒 | https://github.com/yeremeu/CVE-2025-32463_chwoot | POC详情 |
20 | 🛡️ Proof of Concept (PoC) for CVE-2025-32463 — Local privilege escalation in sudo (versions 1.9.14 to 1.9.17). This exploit abuses the --chroot option and a malicious nsswitch.conf to execute arbitrary code as root. ⚠️ For educational and authorized testing only. | https://github.com/cyberpoul/CVE-2025-32463-POC | POC详情 |
21 | CVE-2025-32463 | https://github.com/B1ack4sh/Blackash-CVE-2025-32463 | POC详情 |
22 | Local privilege escalation vulnerability CVE-2025-32463 in Sudo allows users to gain root access. Discover details and solutions on GitHub! 🐙✨ | https://github.com/SkylerMC/CVE-2025-32463 | POC详情 |
23 | Linux distributions: Affects Ubuntu, Debian, Fedora, CentOS, SUSE, Amazon Linux, and others shipping sudo v1.9.14–1.9.17 | https://github.com/junxian428/CVE-2025-32463 | POC详情 |
24 | Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only. | https://github.com/FreeDurok/CVE-2025-32463-PoC | POC详情 |
25 | None | https://github.com/Chocapikk/CVE-2025-32463-lab | POC详情 |
26 | A PoC exploit for CVE-2025-32463 - Sudo Privilege Escalation | https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT | POC详情 |
27 | # cve-2025-32463 - Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/SpongeBob-369/cve-2025-32463 | POC详情 |
28 | None | https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot | POC详情 |
29 | PoC for CVE-2025-32463: Local privilege escalation in sudo via --chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments. | https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC | POC详情 |
30 | None | https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT | POC详情 |
31 | Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) | https://github.com/morgenm/sudo-chroot-CVE-2025-32463 | POC详情 |
32 | Privilege escalation to root using sudo chroot, NO NEED for gcc installed. | https://github.com/MohamedKarrab/CVE-2025-32463 | POC详情 |
33 | Educational Docker lab to simulate privilege escalation via CVE-2025-32463 | https://github.com/dbarquero/cve-2025-32463-lab | POC详情 |
34 | CVE-2025-32463 漏洞概念验证 | https://github.com/9Insomnie/CVE-2025-32463 | POC详情 |
35 | None | https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC | POC详情 |
36 | None | https://github.com/Floodnut/CVE-2025-32463 | POC详情 |
37 | Privilege escalation to root via sudo without gcc. Exploit works on vulnerable sudo versions. Clone the repo and run the script. 🐙💻 | https://github.com/92gmuz/CVE-2025-32463 | POC详情 |
38 | This is the exploit for the CVE-2025-32463 | https://github.com/Rajneeshkarya/CVE-2025-32463 | POC详情 |
39 | Local Privilege Escalation to Root via Sudo chroot in Linux | https://github.com/MGunturG/CVE-2025-32463 | POC详情 |
40 | End-to-end simulation of a Python dependency confusion attack, sudo privilege escalation (CVE-2025-32463), and rootkit-based persistence - with full memory and network forensic analysis. | https://github.com/IC3-512/linux-root-kit | POC详情 |
41 | None | https://github.com/daryllundy/CVE-2025-32463 | POC详情 |
42 | A deep dive into two critical Sudo vulnerabilities (CVE‑2025‑32463 & CVE‑2025‑32462) that enable local privilege escalation across major Linux distributions. | https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462 | POC详情 |
43 | CVE-2025-32463 | https://github.com/ChetanKomal/sudo_exploit | POC详情 |
44 | CVE-2025-32463 - Sudo Chroot Privilege Escalation Exploit | https://github.com/KaiHT-Ladiant/CVE-2025-32463 | POC详情 |
45 | 本项目基于 Docker 搭建了一个用于复现和测试 sudo 本地权限提升漏洞 CVE-2025-32463 的实验环境。 | https://github.com/y4ney/CVE-2025-32463-lab | POC详情 |
标题: oss-security - CVE-2025-32463: sudo local privilege escalation via chroot option -- 🔗来源链接
标签:
神龙速读标题: 959314 – (CVE-2025-32462, CVE-2025-32463) <app-admin/sudo-1.9.17_p1: two local privilege escalation vulnerabilities -- 🔗来源链接
标签:
神龙速读暂无评论