Share
## https://sploitus.com/exploit?id=7B535FDC-BE9D-551D-991D-6677B9892485
# CVE-2025-32463 - sudo Local Privilege Escalation (PoC)

![MIT License](https://img.shields.io/badge/license-MIT-green)
![PoC](https://img.shields.io/badge/status-proof--of--concept-blue)
![Visitors](https://visitor-badge.laobi.icu/badge?page_id=cyberpoul.CVE-2025-32463-POC)

> โš ๏ธ **This repository contains a Proof of Concept (PoC) exploit for CVE-2025-32463**  
> Intended **only for educational purposes** and use in **authorized environments**.



---

## ๐Ÿง  About the Vulnerability

**CVE-2025-32463** is a local privilege escalation vulnerability affecting `sudo` versions **1.9.14 to 1.9.17**.

The flaw resides in the way `sudo` handles the `--chroot` (`-R`) option introduced in 1.9.14. It allows an unprivileged user to craft a fake `nsswitch.conf` inside a controlled chroot path, forcing `sudo` (running as root) to load an arbitrary **NSS library** and execute code as root.

---

## โœ… Affected Versions

- `sudo` **โ‰ฅ 1.9.14** and **< 1.9.17p1**
- Unaffected:  
  - Versions **< 1.9.14** (feature not present)  
  - Versions **โ‰ฅ 1.9.17p1** (vulnerability patched)

---

## ๐Ÿšฉ Requirements

- A vulnerable version of `sudo` (see above)
- `gcc` installed
- The user can run `sudo -R` with an arbitrary directory *(some setups restrict this)*

---

## ๐Ÿš€ Exploit Steps

1. Clone this repository or just download the script
2. Run the PoC script:

```bash
chmod +x CVE-2025-32463.sh
./CVE-2025-32463.sh