支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 58ffcff74ccf6d6c1b7a036e507a276d85005368

来源
关联漏洞
标题:Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Practical security research project exploiting CVE-2025-32463 to gain root access on a vulnerable sudo version. Includes write-up, PoC, and mitigation steps.
介绍
# CVE-2025-32463-Sudo-Privilege-Escalation
✔️ Completed on HackViser (VIP Challenge)

This repository contains a working exploit for **CVE-2025-32463**, a critical vulnerability (CVSS 9.3) affecting `sudo` versions **1.9.14 → 1.9.17** that allows **local privilege escalation to ROOT** by abusing the **--chroot (-R)** option.

The exploit abuses a shared library load via `libnss_` inside a temporary chroot environment to execute an arbitrary command as root.

---

## 🚨 Vulnerability Summary

| Field | Details |
|------|---------|
| CVE | **CVE-2025-32463** |
| Affected Versions | sudo 1.9.14 – 1.9.17 |
| Fixed Version | 1.9.17p1 |
| Severity | **Critical (9.3 CVSS)** |
| Attack Vector | Local |
| Impact | Full Root Privilege Escalation |
| Mitigation | Upgrade / Disable chroot option |

---

## 🧑‍💻 HackViser Challenge Details

**Task:**  
Gain root access on the target machine and retrieve the flag from:
1️⃣ SSH into the target machine
# ssh guest@<TARGET-IP>
2️⃣ Move into /tmp (writeable location)
# cd /tmp
3️⃣ Create exploit file
# nano run.sh
4️⃣ Paste the exploit (script below)
Save ➝ Ctrl+X ➝ Y ➝ Enter
5️⃣ Make executable
chmod +x run.sh
6️⃣ Run exploit
./run.sh
7️⃣ Verify root access
id
whoami
8️⃣ Read the flag
cat /secret.txt
文件快照

[4.0K] /data/pocs/58ffcff74ccf6d6c1b7a036e507a276d85005368 ├── [ 157] Defensive Recommendations ├── [1.0K] License ├── [1.3K] README.md └── [1.0K] sudo-chwoot.sh 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。