POC详情: 8d1c0acb9bb4e5a229e3375aa9e40a5a5e4e50be

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
介绍
# CVE-2025-32463
[NVD CVE-2025-32463](https://nvd.nist.gov/vuln/detail/cve-2025-32463)  
In most cases, **GCC is not installed by default** on target servers.  
This proof of concept provides a precompiled version to ensure it can be executed immediately on affected systems.

---

# Usage

## 1. Compile the `woot1337.c` file:
```bash
gcc -shared -fPIC -Wl,-init,woot -o libwoot1337.so woot1337.c
```
## 2. Convert the .so file into a C array (byte format):
```bash
xxd -i libwoot1337.so > libwoot1337.h
```
## 3. Compile the cve_2025_32463.c file:
```bash
gcc cve_2025_32463.c -o cve_2025_32463
```
## 4. Upload to the affected server and grant execution permissions:
```bash
chmod +x cve_2025_32463
./cve_2025_32463
```
# Disclaimer

This Proof of Concept (PoC) is provided solely for educational and research purposes.
Executing this code on any system without explicit authorization is illegal and unethical.
The authors disclaim any responsibility for misuse or damage caused by the use of this material.
文件快照

[4.0K] /data/pocs/8d1c0acb9bb4e5a229e3375aa9e40a5a5e4e50be ├── [ 32K] cve_2025_32463 ├── [1.1K] cve_2025_32463.c ├── [6.9K] LICENSE ├── [1011] README.md └── [ 193] woot1337.c 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。