Skip to content

Commit 08a0c27

Browse files
authored
Merge pull request #1537 from 0liverFlow/master
CVE-2025-32463 - EoP via sudo < 1.9.17p1
2 parents 88a3b49 + dd3e24d commit 08a0c27

File tree

1 file changed

+8
-0
lines changed
  • src/linux-hardening/privilege-escalation

1 file changed

+8
-0
lines changed

src/linux-hardening/privilege-escalation/README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,14 @@ You can check if the sudo version is vulnerable using this grep.
8383
sudo -V | grep "Sudo ver" | grep "1\.[01234567]\.[0-9]\+\|1\.8\.1[0-9]\*\|1\.8\.2[01234567]"
8484
```
8585

86+
### Sudo < 1.9.17p1
87+
88+
Sudo versions before 1.9.17p1 (**1.9.14 - 1.9.17 < 1.9.17p1**) allows unprivileged local users to escalate their privileges to root via sudo `--chroot` option when `/etc/nsswitch.conf` file is used from a user controlled directory.
89+
90+
Here is a [PoC](https://github.com/pr0v3rbs/CVE-2025-32463_chwoot) to exploit that [vulnerability](https://nvd.nist.gov/vuln/detail/CVE-2025-32463). Before running the exploit, make sure that your `sudo` version is vulnerable and that it supports the `chroot` feature.
91+
92+
For more information, refer to the original [vulnerability advisory](https://www.stratascale.com/resource/cve-2025-32463-sudo-chroot-elevation-of-privilege/)
93+
8694
#### sudo < v1.8.28
8795

8896
From @sickrov

0 commit comments

Comments
 (0)