POC详情: ad3c1044e74ed16c35f9c9a736b1102d21dc978c

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32462)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于允许列出的用户在非预期机器上执行命令。
描述
🔓 Local privilege escalation PoC for CVE-2025-32462 (sudo -h bypass) – gain root via misconfigured sudoers
介绍
# CVE-2025-32462 – sudo -h Privilege Escalation PoC

![MIT License](https://img.shields.io/badge/license-MIT-green)
![PoC](https://img.shields.io/badge/status-proof--of--concept-blue)
![Visitors](https://visitor-badge.laobi.icu/badge?page_id=cyberpoul.CVE-2025-32462-POC)

> 🚨 Local privilege escalation exploit for `sudo` via the `-h/--host` argument  
> Affects systems with `sudo` misconfigurations allowing unintended root access.

---

## 🧠 About

This PoC demonstrates **CVE-2025-32462**, a logic flaw in `sudo` (all versions ≤ 1.9.17),  
where misuse of the `-h` option can bypass RunAs restrictions and allow unintended root command execution.

---

## 📋 Requirements

- Affected `sudo` version: **≤ 1.9.17**
- `sudoers` config includes misconfig like:

  `(ALL, !root) NOPASSWD: ALL`


## 🚀 Usage

- `chmod +x CVE-2025-32462.sh && ./CVE-2025-32462.sh`

- To test a specific command (example: whoami):
 `./CVE-2025-32462.sh whoami`
If the system is vulnerable and misconfigured, this will drop you into a root shell via `sudo -h`. To exit the root shell, type: `exit`


## 🛡️ Mitigation

- Upgrade sudo to 1.9.17p1 or later

- Restrict or disable use of the -h / --host option


## 📚 References

- [NVD Entry – CVE-2025-32462](https://nvd.nist.gov/vuln/detail/CVE-2025-32462)
- [Sudo security advisory](https://www.sudo.ws/security/advisories)
文件快照

[4.0K] /data/pocs/ad3c1044e74ed16c35f9c9a736b1102d21dc978c ├── [ 403] CVE-2025-32462.sh ├── [1.1K] LICENSE └── [1.3K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。