sudo Local Privilege Escalation Vulnerability via --chroot
漏洞信息
漏洞名称: sudo Local Privilege Escalation Vulnerability via –chroot
漏洞编号:
- CVE: CVE-2025-32463
漏洞类型: 权限提升
漏洞等级: 高危
漏洞描述: CVE-2025-32463是一个存在于sudo中的本地权限提升漏洞,影响版本为1.9.14至1.9.17p1之前的sudo二进制文件。sudo是一个广泛使用的Unix和Linux系统命令,允许用户以其他用户(通常是root用户)的权限运行程序,是系统管理员和普通用户常用的工具之一。
该漏洞的技术根源在于sudo的–chroot(-R)功能不安全。攻击者可以通过创建自定义的chroot环境,注入伪造的nsswitch.conf文件,加载恶意的libnss_Xfiles.so.2库,在sudo解析用户信息时触发构造函数载荷,从而以root权限执行任意代码。
此漏洞的影响极为严重,因为它允许具有sudo权限的普通用户在不需要任何额外认证的情况下,通过构造特定的环境变量和文件,实现权限提升至root。这意味着攻击者可以完全控制系统,执行任意命令,访问敏感数据,甚至破坏系统稳定性。由于sudo在大多数Unix和Linux系统中的普及性,此漏洞的潜在影响范围非常广泛,尤其是在多用户环境或共享主机上。
产品名称: sudo
影响版本: 1.9.14 <= version < 1.9.17p1
来源: https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
类型: CVE-2025:github search
仓库文件
- LICENSE
- PoC.py
- README.md
来源概述
CVE-2025-32463_Sudo_PoC
PoC for CVE-2025-32463: Local privilege escalation in sudo via –chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments.
CVE-2025-32463 - Local Privilege Escalation via sudo --chroot
A Python-based proof-of-concept exploit for CVE-2025-32463 — a local privilege escalation vulnerability in
sudo
(v1.9.14 - v1.9.17).
This exploit leverages the insecure--chroot
option insudo
and malicious NSS resolution to execute code asroot
.
⚠️ Disclaimer
This code is provided strictly for educational and research purposes only.
Do NOT use on production systems or without explicit authorization.
You are solely responsible for complying with applicable laws and policies.
📖 Vulnerability Overview
CVE-2025-32463 is a local privilege escalation flaw in sudo
, introduced by its --chroot
(-R
) functionality.
If a user is allowed to invoke sudo
with the -R
flag, they can:
- Create a custom chroot environment
- Inject a fake
nsswitch.conf
- Load malicious
libnss_Xfiles.so.2
- Trigger a constructor payload when
sudo
resolves user info — running code asroot
🧰 Requirements
- Python 3
gcc
(for compiling the shared object payload)- A vulnerable
sudo
binary (v1.9.14 ≤ version < v1.9.17p1) - A system where
sudo
allows the use of--chroot
(e.g., viasudoers
)
Tested on:
- Ubuntu 22.04
- CentOS 8.4 (with downgraded
sudo
) - Debian 11
🚀 Usage
git clone https://github.com/yourhandle/CVE-2025-32463-poc.git
cd CVE-2025-32463-poc
python3 exploit.py [-v]