sudo Local Privilege Escalation Vulnerability via --chroot

漏洞信息

漏洞名称: sudo Local Privilege Escalation Vulnerability via –chroot

漏洞编号:

  • CVE: CVE-2025-32463

漏洞类型: 权限提升

漏洞等级: 高危

漏洞描述: CVE-2025-32463是一个存在于sudo中的本地权限提升漏洞,影响版本为1.9.14至1.9.17p1之前的sudo二进制文件。sudo是一个广泛使用的Unix和Linux系统命令,允许用户以其他用户(通常是root用户)的权限运行程序,是系统管理员和普通用户常用的工具之一。

该漏洞的技术根源在于sudo的–chroot(-R)功能不安全。攻击者可以通过创建自定义的chroot环境,注入伪造的nsswitch.conf文件,加载恶意的libnss_Xfiles.so.2库,在sudo解析用户信息时触发构造函数载荷,从而以root权限执行任意代码。

此漏洞的影响极为严重,因为它允许具有sudo权限的普通用户在不需要任何额外认证的情况下,通过构造特定的环境变量和文件,实现权限提升至root。这意味着攻击者可以完全控制系统,执行任意命令,访问敏感数据,甚至破坏系统稳定性。由于sudo在大多数Unix和Linux系统中的普及性,此漏洞的潜在影响范围非常广泛,尤其是在多用户环境或共享主机上。

产品名称: sudo

影响版本: 1.9.14 <= version < 1.9.17p1

来源: https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

类型: CVE-2025:github search

仓库文件

  • LICENSE
  • PoC.py
  • README.md

来源概述

CVE-2025-32463_Sudo_PoC

PoC for CVE-2025-32463: Local privilege escalation in sudo via –chroot. Exploits NSS module injection through crafted chroot environments. Designed for security researchers and lab-only environments.

CVE-2025-32463 - Local Privilege Escalation via sudo --chroot

A Python-based proof-of-concept exploit for CVE-2025-32463 — a local privilege escalation vulnerability in sudo (v1.9.14 - v1.9.17).
This exploit leverages the insecure --chroot option in sudo and malicious NSS resolution to execute code as root.


⚠️ Disclaimer

This code is provided strictly for educational and research purposes only.
Do NOT use on production systems or without explicit authorization.
You are solely responsible for complying with applicable laws and policies.


📖 Vulnerability Overview

CVE-2025-32463 is a local privilege escalation flaw in sudo, introduced by its --chroot (-R) functionality.
If a user is allowed to invoke sudo with the -R flag, they can:

  • Create a custom chroot environment
  • Inject a fake nsswitch.conf
  • Load malicious libnss_Xfiles.so.2
  • Trigger a constructor payload when sudo resolves user info — running code as root

🧰 Requirements

  • Python 3
  • gcc (for compiling the shared object payload)
  • A vulnerable sudo binary (v1.9.14 ≤ version < v1.9.17p1)
  • A system where sudo allows the use of --chroot (e.g., via sudoers)

Tested on:

  • Ubuntu 22.04
  • CentOS 8.4 (with downgraded sudo)
  • Debian 11

🚀 Usage

git clone https://github.com/yourhandle/CVE-2025-32463-poc.git
cd CVE-2025-32463-poc
python3 exploit.py [-v]



sudo Local Privilege Escalation Vulnerability via --chroot
http://example.com/2025/07/08/github_373643224/
作者
lianccc
发布于
2025年7月8日
许可协议