Below 服务权限提升漏洞

漏洞信息

漏洞名称: Below 服务权限提升漏洞

漏洞编号:

  • CVE: CVE-2025-27591

漏洞类型: 权限提升

漏洞等级: 高危

漏洞描述: CVE-2025-27591是一个影响Below服务的权限提升漏洞,该服务在0.9.0版本之前存在一个安全问题。Below服务是一个由Facebook孵化的系统监控工具,广泛用于服务器和桌面环境,用于收集和分析系统性能数据。由于其部署在需要高权限的环境中,该漏洞的发现引起了广泛关注。漏洞的根源在于Below服务在/var/log/below目录下创建了一个全局可写的目录。攻击者可以通过在该目录中操作符号链接,利用这一漏洞进行权限提升,最终可能获得root权限。这种漏洞对于本地非特权用户来说是一个重大的安全隐患,因为它允许攻击者在不需要任何认证的情况下,通过简单的本地操作提升自己的权限,进而完全控制系统。这不仅可能导致敏感数据泄露,还可能被用于进一步的攻击,如安装恶意软件或破坏系统稳定性。由于该漏洞的利用不需要复杂的交互,且存在公开的PoC代码,使得攻击门槛大大降低,增加了被广泛利用的风险。

产品厂商: Facebook

产品名称: Below

影响版本: version < 0.9.0

来源: https://github.com/BridgerAlderson/CVE-2025-27591-PoC

类型: CVE-2025:github search

仓库文件

  • README.md
  • exploit.py

来源概述

CVE-2025-27591 Proof Of Concept

CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0. The issue arose due to the creation of a world-writable directory at /var/log/below. An attacker could exploit this vulnerability by manipulating symlinks within this directory and potentially gain root privileges, making it a significant security concern for local unprivileged users.

This Proof-of-Concept was written for educational and research purposes only.

At the time of writing, no publicly available PoC for this vulnerability existed in the community.Therefore, I decided to responsibly share this implementation in order to fill that gap, contribute tothe security research ecosystem, and raise awareness about the critical nature of insecure filesystem.

Proof-Of-Concept

From attacker machine:

1-git clone https://github.com/BridgerAlderson/CVE-2025-27591-PoC.git

2-cd CVE-2025-27591-PoC

3-python3 -m http.server 80

From vulnerable system:

1-python exploit.py

image

References

https://www.facebook.com/security/advisories/cve-2025-27591
https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3


Below 服务权限提升漏洞
http://example.com/2025/07/13/github_1976719836/
作者
lianccc
发布于
2025年7月13日
许可协议