POC详情: 3dfcc43df8babb81000731ae84807d387e64c54e

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) on Kali Linux and Ubuntu WSL.
介绍
# sudo_patch_CVE-2025-32463
Mr.CIA's manual patching guide for CVE-2025-32463 (Sudo local privilege escalation) tested on Kali Linux and Ubuntu WSL.

# CVE-2025-32463 Sudo Patch Guide 🛡️

Eish, CVE-2025-32463 is a nasty local privilege escalation flaw (CVSS 9.3) in Sudo 1.9.14–1.9.17, exploitable via the `--chroot` option. Kali Linux has no official patch yet, and Ubuntu users need to stay sharp. This lekker guide shows you how to manually patch Sudo on Kali and Ubuntu WSL to keep your systems secure. 🚀

## Why This Matters
CVE-2025-32463 lets unprivileged users gain root access by exploiting Sudo’s `--chroot` feature. Reported by Rich Mirch on June 30, 2025, it affects major Linux distros and macOS. Kali users are especially at risk due to no official patch. Patch now to avoid a hacker having a jol with your system! 😬

## Prerequisites
- Root access (`sudo`)
- Internet connection
- Build tools:
  ```bash
  sudo apt install build-essential
文件快照

[4.0K] /data/pocs/3dfcc43df8babb81000731ae84807d387e64c54e ├── [1.0K] LICENSE ├── [1.8K] patch_sudo_cve2025-32463.sh └── [ 969] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。