关联漏洞
标题:
Sudo 安全漏洞
(CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
介绍
# CVE-2025-32463 – Privilege Escalation via Sudo chroot
## 📝 Overview
**CVE-2025-32463** is a local privilege escalation vulnerability affecting the `sudo` utility.
It allows a regular user to escalate privileges to root by exploiting the `-R` option (which sets a custom runtime root directory) together with manipulated NSS configurations.
- **CVE:** CVE-2025-32463
- **Component:** sudo
- **Impact:** Local Privilege Escalation (root)
- **Discovered by:** Rich Mirch
---
## 🚨 Risk & Impact
A successful exploit gives a low-privileged local user full root access, completely breaching the system security boundary.
---
## 🔬 Testing the Exploit
### Usage Example
```bash
git clone https://github.com/FreeDurok/CVE-2025-32463-PoC.git
cd CVE-2025-32463-PoC
# Check current user privileges
id
# Run the exploit
./escalate.sh
# Verify escalated privileges
id
```

## 📌 Affected Versions
✅ Patched: sudo 1.9.17p1 and newer
🚩 Vulnerable: sudo 1.9.14 up to 1.9.17
🕗 Not impacted: Versions before 1.9.14 (the -R feature did not exist)
## 🔒 Mitigation & Hardening
Upgrade to sudo 1.9.17p1 or later.
Consider limiting or auditing the use of sudo -R through configuration policies.
Use security modules like SELinux or AppArmor to restrict unexpected sudo operations.
### References
- [Rick Mirch blog](https://blog.mirch.io/sudo-elevation-of-privilege-vulnerabilities/)
- [NVD Entry for CVE-2025-32463](https://nvd.nist.gov/vuln/detail/CVE-2025-32463)
- [Stratascale Security Research](https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot)
## ⚠️ Legal Notice
This repository is provided for authorized security testing and educational purposes only.
Executing these scripts on systems without explicit permission is illegal and violates ethical standards.
文件快照
[4.0K] /data/pocs/707257acc4942f62a7200ff038d77ed232749824
├── [ 966] escalate.sh
└── [1.8K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。