关联漏洞
描述
The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022
介绍
# CVE-2025-32462 - Sudo Host Bypass Exploit
## Original Discovery
This vulnerability was discovered by Rich Mirch.
More details can be found at:
https://cxsecurity.com/issue/WLB-2025070022
## About
This script is an exploit for CVE-2025-32462, allowing privilege escalation by bypassing sudo's host restrictions.
It targets Linux systems with affected versions of sudo and requires that the `sudo -h` option is accepted with `NOPASSWD` rights.
## Notes
This implementation was written by J3rich0123 for educational and CTF purposes.
Credit for discovery remains solely with Rich Mirch.
## Usage
Run the script to start a pseudo-root shell on a target host defined in `TARGET_HOST`.
For a full interactive shell, type `bash` inside the prompt or run `vim` → `:!bash`.
文件快照
[4.0K] /data/pocs/e72a3400a0694f92b0777dc43fea274fc02f897f
├── [ 928] exploit.sh
└── [ 783] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。