关联漏洞
标题:
Sudo 安全漏洞
(CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Local Privilege Escalation to Root via Sudo chroot in Linux
介绍
<h1 align="center">
<br>
<a><img src="/img/logo.png" alt="" width="300px;"></a>
<br>
<img src="https://img.shields.io/badge/PRs-welcome-blue">
<img src="https://img.shields.io/github/last-commit/kh4sh3i/CVE-2025-32463">
<img src="https://img.shields.io/github/commit-activity/m/kh4sh3i/CVE-2025-32463">
<a href="https://twitter.com/intent/follow?screen_name=kh4sh3i_"><img src="https://img.shields.io/twitter/follow/kh4sh3i_?style=flat&logo=twitter"></a>
<a href="https://github.com/kh4sh3i"><img src="https://img.shields.io/github/stars/kh4sh3i?style=flat&logo=github"></a>
</h1>
# CVE-2025-32463
Local Privilege Escalation to Root via Sudo chroot in Linux
## 🛑 Vulnerability Summary
**CVE-2025-32463** is a **local privilege escalation vulnerability** in the **Sudo** binary. The flaw allows a local user to escalate privileges to **root** under specific misconfigurations or with crafted inputs. The issue was discovered by **Rich Mirch**.
- **CVE-ID:** CVE-2025-32463
- **Component:** sudo
- **Type:** Local Privilege Escalation (EoP)
- **CVSS Score:** TBD
- **Discovered by:** [Rich Mirch](https://twitter.com/rmirch)
## 🔥 Impact
An attacker with low privileges can exploit this vulnerability to gain **root access**, compromising the system entirely.
## 🧪 Proof of Concept
<h1 align="center">
<a><img src="/img/poc.jpg" alt="" width="500px;"></a>
</h1>
### Exploit
```bash
git clone https://github.com/kh4sh3i/CVE-2025-32463.git
cd CVE-2025-32463
chmod +x exploit.sh
id
./exploit.sh
id
```
## 🛠 Affected Versions
- Vulnerable: sudo 1.9.14 to 1.9.17
- Patched: sudo 1.9.17p1 and later
- Not affected: Legacy versions prior to 1.9.14 (chroot feature did not exist)
## 🛡️ Mitigation
- Update `sudo` to the latest patched version.
- Use security frameworks like AppArmor or SELinux to limit sudo behavior.
- Monitor for abnormal sudo invocations.
## 🧷 References
- [CVE-2025-32463 on NVD](https://nvd.nist.gov/vuln/detail/CVE-2025-32463)
- [Rich Mirch on Twitter](https://twitter.com/rmirch)
- [sudo project](https://www.sudo.ws)
- [stratascale](https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot)
## ⚠️ Disclaimer
This PoC is provided for **educational and research** purposes only. Running this on any system without permission is **illegal** and unethical.
文件快照
[4.0K] /data/pocs/1c5efc933fb58019687336c6ce520a8e11fb7e77
├── [ 637] exploit.sh
├── [4.0K] img
│ ├── [ 27K] logo.png
│ └── [ 25K] poc.jpg
├── [6.9K] LICENSE
└── [2.3K] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。