Skip to content

Commit ef61041

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent da7224e commit ef61041

File tree

1 file changed

+52
-0
lines changed

1 file changed

+52
-0
lines changed

db/modules_metadata_base.json

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92491,6 +92491,58 @@
9249192491
"needs_cleanup": true,
9249292492
"actions": []
9249392493
},
92494+
"exploit_linux/local/sudo_chroot_cve_2025_32463": {
92495+
"name": "Sudo Chroot 1.9.17 Privilege Escalation",
92496+
"fullname": "exploit/linux/local/sudo_chroot_cve_2025_32463",
92497+
"aliases": [],
92498+
"rank": 300,
92499+
"disclosure_date": "2025-06-30",
92500+
"type": "exploit",
92501+
"author": [
92502+
"msutovsky-r7",
92503+
"Stratascale",
92504+
"Rich Mirch"
92505+
],
92506+
"description": "Sudo before version 1.19.17p1 allows user to use `chroot` option, when\n executing command. The option is intended to run a command with\n user-selected root directory (if sudoers file allow it). Change in version\n 1.9.14 allows resolving paths via `chroot` using user-specified root\n directory when sudoers is still evaluating.\n This allows the attacker to trick Sudo into loading arbitrary shared object,\n thus resulting in a privilege escalation.",
92507+
"references": [
92508+
"EDB-52352",
92509+
"URL-https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/",
92510+
"CVE-2025-32463"
92511+
],
92512+
"platform": "Linux",
92513+
"arch": "cmd",
92514+
"rport": null,
92515+
"autofilter_ports": [],
92516+
"autofilter_services": [],
92517+
"targets": [
92518+
"Auto"
92519+
],
92520+
"mod_time": "2025-08-27 17:58:11 +0000",
92521+
"path": "/modules/exploits/linux/local/sudo_chroot_cve_2025_32463.rb",
92522+
"is_install_path": true,
92523+
"ref_name": "linux/local/sudo_chroot_cve_2025_32463",
92524+
"check": true,
92525+
"post_auth": false,
92526+
"default_credential": false,
92527+
"notes": {
92528+
"Stability": [
92529+
"crash-safe"
92530+
],
92531+
"Reliability": [
92532+
"repeatable-session"
92533+
],
92534+
"SideEffects": [
92535+
"artifacts-on-disk",
92536+
"ioc-in-logs"
92537+
]
92538+
},
92539+
"session_types": [
92540+
"shell",
92541+
"meterpreter"
92542+
],
92543+
"needs_cleanup": true,
92544+
"actions": []
92545+
},
9249492546
"exploit_linux/local/sudoedit_bypass_priv_esc": {
9249592547
"name": "Sudoedit Extra Arguments Priv Esc",
9249692548
"fullname": "exploit/linux/local/sudoedit_bypass_priv_esc",

0 commit comments

Comments
 (0)