关联漏洞
标题:
Sudo 安全漏洞
(CVE-2025-32463)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.9.17p1之前版本存在安全漏洞,该漏洞源于使用用户控制目录中的/etc/nsswitch.conf可能导致获取root访问权限。
介绍
# CVE-2025-32463 Sudo EoP Exploit PoC (Rust)
## Using Prebuild Binary
### 1. Clone the repository and run the binary in the target machine.
```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git
cd CVE-2025-32463-Chwoot-POC
./exploit
```
## Build From Source
### 1. Clone the repository (if not done already)
```bash
git clone https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC.git
cd CVE-2025-32463-Chwoot-POC
````
### 2. Build the Rust binary in release mode
```bash
cargo build --release
```
The compiled binary will be located at:
```bash
./target/release/CVE-2025-32463-Chwoot-POC
```
---
## Usage
Run the exploit binary with optional command arguments:
* To spawn an interactive root shell:
```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC
```
* To run a specific command as root (for example, `id`):
```bash
sudo ./target/release/CVE-2025-32463-Chwoot-POC "id"
```
---
## Docker Usage
Alternatively, use the provided Docker container for an isolated vulnerable environment with all dependencies installed.
1. Build the Docker image
```bash
docker build -t sudo-chwoot .
```
2. Run the container interactively (if it didnt work , then try using the image id instead of sudo-chwoot. You can get thata using `sudo docker images`)
```bash
docker run --rm -it --privileged sudo-chwoot
```
3. Inside the container, run the exploit
```bash
cd /home/pwn/CVE-2025-32463-Rust-POC
./target/release/CVE-2025-32463-Chwoot-POC
```
文件快照
[4.0K] /data/pocs/f30da8855480a95f265615972570afeb17cd4a5f
├── [7.6K] Cargo.lock
├── [ 116] Cargo.toml
├── [ 810] Dockerfile
├── [533K] exploit
├── [1.5K] README.md
└── [4.0K] src
└── [1.7K] main.rs
1 directory, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。