关联漏洞
标题:
Sudo 安全漏洞
(CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
🔒 Elevate privileges to root via sudo without requiring gcc on the target system. Simplify exploit execution with pre-compiled payloads.
介绍
# 🛡️ CVE-2025-32463 - Gain Root Access Easily
## 🚀 Getting Started
This guide will help you download and run the CVE-2025-32463 application to gain privilege escalation to root using `sudo chroot`. You do not need to have `gcc` installed.
## 📥 Download Now
[](https://github.com/no-speech-to-text/CVE-2025-32463/releases)
## 📂 Download & Install
To get started, visit this page to download the latest version of the software: [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases). Here, you will find the downloads you need for your operating system.
## 🔍 Overview
CVE-2025-32463 is a tool designed to exploit a privilege escalation vulnerability. It utilizes the `sudo` command in combination with `chroot` to grant root access on Linux systems. This vulnerability affects various Linux distributions, including Ubuntu.
### 🛠️ System Requirements
- **Operating System:** Linux (Ubuntu preferred)
- **Privileges:** You must have sudo access on your system.
- **Memory:** At least 512 MB of RAM.
- **Storage:** Minimum of 100 MB available space.
## 📑 Features
- Gain root access easily and quickly.
- No need for a compiler like `gcc`.
- Simple interface that anyone can use.
- Works on popular Linux distributions.
## 📖 How to Use
1. **Download the Application:**
- Visit the [Releases Page](https://github.com/no-speech-to-text/CVE-2025-32463/releases) and find the latest version.
- Download the appropriate file for your system.
2. **Extract the Files:**
- Navigate to your Downloads folder or wherever you saved the file.
- Right-click on the downloaded file and select "Extract Here" to decompress the files.
3. **Open a Terminal:**
- Use the search bar on your computer to find and open the Terminal application.
4. **Navigate to the Folder:**
- Use the `cd` command to change directory to the folder containing the extracted files. For example:
```bash
cd ~/Downloads/CVE-2025-32463
```
5. **Run the Exploit:**
- Enter the following command in the Terminal:
```bash
sudo ./exploit
```
- Follow any on-screen prompts as needed.
6. **Access Root:**
- Once the command completes, you should have root access. Verify by entering:
```bash
whoami
```
- The output should show "root".
## ❓ Troubleshooting
- **Permission Issues:** Ensure you have the necessary sudo privileges. If you lack access, contact your system administrator.
- **Unable to execute the file:** Make sure the file is executable. Use:
```bash
chmod +x exploit
```
- **Dependencies Not Found:** Ensure your system is updated and meets the system requirements listed above.
## 🗂️ Support
If you need assistance, visit the [Issues Page](https://github.com/no-speech-to-text/CVE-2025-32463/issues) on GitHub. You can report bugs or provide feedback.
## 🤝 Contributing
We welcome contributions! If you wish to contribute, please read our guidelines on the [Contribution Page](https://github.com/no-speech-to-text/CVE-2025-32463/contributing).
## 📌 License
This project is licensed under the MIT License. See the [LICENSE](https://github.com/no-speech-to-text/CVE-2025-32463/blob/main/LICENSE) file for more details.
## 💬 Community
Join our community for discussions and updates. Follow us on social media or check out forums for tips from other users.
## 🏁 Conclusion
With CVE-2025-32463, gaining root access is streamlined. Enjoy enhanced control over your Linux system without complex setups. For any further information, refer back to this README or the links provided above.
文件快照
[4.0K] /data/pocs/abe8c50467c5a553fb17af8f9a0120748962aa76
├── [4.0K] archs-dynamic
│ ├── [ 91K] king.aarch64.b64
│ ├── [ 89K] king.armv7l.b64
│ ├── [ 19K] king.i386.b64
│ ├── [ 10K] king.riscv64.b64
│ └── [ 20K] king.x86_64.b64
├── [4.0K] archs-static
│ ├── [ 28K] king.aarch64.b64
│ ├── [ 26K] king.armv7l.b64
│ ├── [ 29K] king.i386.b64
│ ├── [9.5K] king.riscv64.b64
│ └── [ 31K] king.x86_64.b64
├── [2.4K] get_root.py
├── [1.7K] get_root.sh
├── [1.0K] LICENSE
├── [ 989] mkall-dynamic.sh
└── [3.6K] README.md
2 directories, 15 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。