Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32463 PoC — Sudo 安全漏洞

Source
Associated Vulnerability
Title:Sudo 安全漏洞 (CVE-2025-32463)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
Description
Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerable Linux systems. For educational and authorized security testing only.
Readme
# CVE-2025-32463 – Privilege Escalation via Sudo chroot

## 📝 Overview

**CVE-2025-32463** is a local privilege escalation vulnerability affecting the `sudo` utility.  
It allows a regular user to escalate privileges to root by exploiting the `-R` option (which sets a custom runtime root directory) together with manipulated NSS configurations.

- **CVE:** CVE-2025-32463  
- **Component:** sudo  
- **Impact:** Local Privilege Escalation (root)  
- **Discovered by:** Rich Mirch

---

## 🚨 Risk & Impact

A successful exploit gives a low-privileged local user full root access, completely breaching the system security boundary.

---

## 🔬 Testing the Exploit

### Usage Example

```bash
git clone https://github.com/FreeDurok/CVE-2025-32463-PoC.git
cd CVE-2025-32463-PoC

# Check current user privileges
id

# Run the exploit
./escalate.sh

# Verify escalated privileges
id
```

![Privilege escalation demo](.img/poc.gif)


## 📌 Affected Versions
✅ Patched: sudo 1.9.17p1 and newer

🚩 Vulnerable: sudo 1.9.14 up to 1.9.17

🕗 Not impacted: Versions before 1.9.14 (the -R feature did not exist)

## 🔒 Mitigation & Hardening
Upgrade to sudo 1.9.17p1 or later.

Consider limiting or auditing the use of sudo -R through configuration policies.

Use security modules like SELinux or AppArmor to restrict unexpected sudo operations.

### References

- [Rick Mirch blog](https://blog.mirch.io/sudo-elevation-of-privilege-vulnerabilities/)
- [NVD Entry for CVE-2025-32463](https://nvd.nist.gov/vuln/detail/CVE-2025-32463)
- [Stratascale Security Research](https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot)


## ⚠️ Legal Notice
This repository is provided for authorized security testing and educational purposes only.
Executing these scripts on systems without explicit permission is illegal and violates ethical standards.
File Snapshot

[4.0K] /data/pocs/707257acc4942f62a7200ff038d77ed232749824 ├── [ 966] escalate.sh └── [1.8K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.