POC详情: e72a3400a0694f92b0777dc43fea274fc02f897f

来源
关联漏洞
标题: Sudo 安全漏洞 (CVE-2025-32462)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于允许列出的用户在非预期机器上执行命令。
描述
The vulnerability was found by Rich Mirch. More details on it here: https://cxsecurity.com/issue/WLB-2025070022
介绍
# CVE-2025-32462 - Sudo Host Bypass Exploit

## Original Discovery
This vulnerability was discovered by Rich Mirch.  
More details can be found at:  
https://cxsecurity.com/issue/WLB-2025070022

## About
This script is an exploit for CVE-2025-32462, allowing privilege escalation by bypassing sudo's host restrictions.  
It targets Linux systems with affected versions of sudo and requires that the `sudo -h` option is accepted with `NOPASSWD` rights.

## Notes
This implementation was written by J3rich0123 for educational and CTF purposes.  
Credit for discovery remains solely with Rich Mirch.

## Usage
Run the script to start a pseudo-root shell on a target host defined in `TARGET_HOST`.  
For a full interactive shell, type `bash` inside the prompt or run `vim` → `:!bash`.
文件快照

[4.0K] /data/pocs/e72a3400a0694f92b0777dc43fea274fc02f897f ├── [ 928] exploit.sh └── [ 783] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。