Below 服务权限提升漏洞
漏洞信息
漏洞名称: Below 服务权限提升漏洞
漏洞编号:
- CVE: CVE-2025-27591
漏洞类型: 权限提升
漏洞等级: 高危
漏洞描述: CVE-2025-27591是一个影响Below服务的权限提升漏洞,该服务在0.9.0版本之前存在一个安全问题。Below服务是一个由Facebook孵化的系统监控工具,广泛用于服务器和桌面环境,用于收集和分析系统性能数据。由于其部署在需要高权限的环境中,该漏洞的发现引起了广泛关注。漏洞的根源在于Below服务在/var/log/below目录下创建了一个全局可写的目录。攻击者可以通过在该目录中操作符号链接,利用这一漏洞进行权限提升,最终可能获得root权限。这种漏洞对于本地非特权用户来说是一个重大的安全隐患,因为它允许攻击者在不需要任何认证的情况下,通过简单的本地操作提升自己的权限,进而完全控制系统。这不仅可能导致敏感数据泄露,还可能被用于进一步的攻击,如安装恶意软件或破坏系统稳定性。由于该漏洞的利用不需要复杂的交互,且存在公开的PoC代码,使得攻击门槛大大降低,增加了被广泛利用的风险。
产品厂商: Facebook
产品名称: Below
影响版本: version < 0.9.0
来源: https://github.com/BridgerAlderson/CVE-2025-27591-PoC
类型: CVE-2025:github search
仓库文件
- README.md
- exploit.py
来源概述
CVE-2025-27591 Proof Of Concept
CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0. The issue arose due to the creation of a world-writable directory at /var/log/below. An attacker could exploit this vulnerability by manipulating symlinks within this directory and potentially gain root privileges, making it a significant security concern for local unprivileged users.
This Proof-of-Concept was written for educational and research purposes only.
At the time of writing, no publicly available PoC for this vulnerability existed in the community.Therefore, I decided to responsibly share this implementation in order to fill that gap, contribute tothe security research ecosystem, and raise awareness about the critical nature of insecure filesystem.
Proof-Of-Concept
From attacker machine:
1-git clone https://github.com/BridgerAlderson/CVE-2025-27591-PoC.git
2-cd CVE-2025-27591-PoC
3-python3 -m http.server 80
From vulnerable system:
1-python exploit.py
References
https://www.facebook.com/security/advisories/cve-2025-27591
https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3