POC详情: d6bdb7d2f8c13b78f75dd66e476cc07816837d88

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
描述
Sudo chroot privileged escalation PoC
介绍
# CVE-2025-32463 - Sudo Privilege Escalation PoC

/////// Disclaimer /////////////////////////////////////////////////////////////////////////////////////////////////////////////////

This project is provided solely for educational purposes.
By using any part of this repository, you acknowledge that you will not 
utilize the code or techniques contained herein to gain unauthorized access 
to systems that you do not own or have explicit permission to test. 

The author (nflatrea) assumes no responsibility or liability for any misuse, 
damage, or consequences resulting from the use of this proof-of-concept or 
related materials, and you agree to use this code at your own risk.

//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

This repository provides a proof-of-concept exploit for a local privilege escalation vulnerability 
in sudo versions 1.9.1 through 1.9.17, allowing an unprivileged user to escalate to root privileges 
by abusing the --chroot (-R) feature, even without specific sudo rules.

The latter includes a single file:

`bipboop.sh` : A self-contained bash script that demonstrates the exploit. 
It creates a fake chroot environment, builds a malicious NSS module, and uses 
sudo -R to trigger the vulnerability.

### Requirements

- A Linux system with `sudo` version between 1.9.14 and 1.9.17
- `gcc` and basic build tools installed

### Vulnerability Overview

**CVE-2025-32463** allows for arbitrary shared object loading with root privileges 
due to unsafe chroot() behavior combined with Name Service Switch (NSS) 
lookups during command matching, enabling an unprivileged user to exploit 
writable and controlled directories. When sudo chroots into a directory that is writable and 
controlled by an unprivileged user, it will resolve user information using the NSS configuration 
inside the chroot. This leads to arbitrary shared object loading  with root privileges.

By planting a malicious shared object (e.g., `libnss_/bipboop.so.2`) in the fake chroot environment,
an attacker can trigger its execution with sudo, resulting in privilege escalation.

This issue was introduced in sudo version 1.9.14 and is patched in version 1.9.17p1, where the 
chroot feature was deprecated.

### Affected Versions

- `sudo` 1.9.14 to 1.9.17 (VULNERABLE)
- `sudo` 1.9.17p1 and later (PATCHED)
- Legacy versions prior to 1.9.14 (chroot feature did not exist) (NOT AFFECTED)

### Credit

`CVE-2025-32463` was discovered by Rich Mirch of the Stratascale Cyber Research Unit (CRU).

Full Disclosure : https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot

The Stratascale CRU team conducted detailed analysis of the sudo chroot implementation and
identified the vulnerability as part of ongoing research into privileged Linux utilities. 
Their work included discovery, exploitation, responsible disclosure to the sudo maintainer, 
and coordination with MITRE for CVE assignment.

文件快照

[4.0K] /data/pocs/d6bdb7d2f8c13b78f75dd66e476cc07816837d88 ├── [ 999] bipboop.sh └── [2.9K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。