POC详情: 1c5efc933fb58019687336c6ce520a8e11fb7e77

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Local Privilege Escalation to Root via Sudo chroot in Linux
介绍
<h1 align="center">
  <br>
  <a><img src="/img/logo.png" alt="" width="300px;"></a>
  <br>
  <img src="https://img.shields.io/badge/PRs-welcome-blue">
  <img src="https://img.shields.io/github/last-commit/kh4sh3i/CVE-2025-32463">
  <img src="https://img.shields.io/github/commit-activity/m/kh4sh3i/CVE-2025-32463">
  <a href="https://twitter.com/intent/follow?screen_name=kh4sh3i_"><img src="https://img.shields.io/twitter/follow/kh4sh3i_?style=flat&logo=twitter"></a>
  <a href="https://github.com/kh4sh3i"><img src="https://img.shields.io/github/stars/kh4sh3i?style=flat&logo=github"></a>
</h1>


# CVE-2025-32463
Local Privilege Escalation to Root via Sudo chroot in Linux


## 🛑 Vulnerability Summary

**CVE-2025-32463** is a **local privilege escalation vulnerability** in the **Sudo** binary. The flaw allows a local user to escalate privileges to **root** under specific misconfigurations or with crafted inputs. The issue was discovered by **Rich Mirch**.

- **CVE-ID:** CVE-2025-32463  
- **Component:** sudo  
- **Type:** Local Privilege Escalation (EoP)  
- **CVSS Score:** TBD  
- **Discovered by:** [Rich Mirch](https://twitter.com/rmirch)

## 🔥 Impact

An attacker with low privileges can exploit this vulnerability to gain **root access**, compromising the system entirely.

## 🧪 Proof of Concept
<h1 align="center">
  <a><img src="/img/poc.jpg" alt="" width="500px;"></a>
</h1>

###  Exploit
```bash
git clone https://github.com/kh4sh3i/CVE-2025-32463.git
cd CVE-2025-32463
chmod +x exploit.sh
id
./exploit.sh
id
```

## 🛠 Affected Versions

- Vulnerable: sudo 1.9.14 to 1.9.17
- Patched: sudo 1.9.17p1 and later
- Not affected: Legacy versions prior to 1.9.14 (chroot feature did not exist)

## 🛡️ Mitigation

- Update `sudo` to the latest patched version.
- Use security frameworks like AppArmor or SELinux to limit sudo behavior.
- Monitor for abnormal sudo invocations.

## 🧷 References

- [CVE-2025-32463 on NVD](https://nvd.nist.gov/vuln/detail/CVE-2025-32463)
- [Rich Mirch on Twitter](https://twitter.com/rmirch)
- [sudo project](https://www.sudo.ws)
- [stratascale](https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot)

## ⚠️ Disclaimer

This PoC is provided for **educational and research** purposes only. Running this on any system without permission is **illegal** and unethical.
文件快照

[4.0K] /data/pocs/1c5efc933fb58019687336c6ce520a8e11fb7e77 ├── [ 637] exploit.sh ├── [4.0K] img │   ├── [ 27K] logo.png │   └── [ 25K] poc.jpg ├── [6.9K] LICENSE └── [2.3K] README.md 1 directory, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。