# Windows打印Spooler远程代码执行漏洞
## 概述
Windows Print Spooler存在远程代码执行漏洞,攻击者可能利用该漏洞在目标系统上执行任意代码。
## 影响版本
- Windows 10 (所有版本)
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
## 细节
该漏洞源于Print Spooler服务中的一个处理缺陷,远程攻击者可能通过向目标系统发送特定的打印机指令,利用该漏洞来执行任意代码。成功利用此漏洞的攻击者可以获取和控制目标系统的所有权限。
## 影响
- 允许未经授权的用户在目标系统上执行任意代码
- 可能导致系统被完全控制,包括但不限于数据泄露、系统篡改或安装恶意软件
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2021-1675 exploit | https://github.com/yu2u/CVE-2021-1675 | POC详情 |
| 2 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/cube0x0/CVE-2021-1675 | POC详情 |
| 3 | CVE-2021-1675 Detection Info | https://github.com/LaresLLC/CVE-2021-1675 | POC详情 |
| 4 | None | https://github.com/kondah/patch-cve-2021-1675 | POC详情 |
| 5 | PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527 | https://github.com/evilashz/CVE-2021-1675-LPE-EXP | POC详情 |
| 6 | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 | https://github.com/hlldz/CVE-2021-1675-LPE | POC详情 |
| 7 | None | https://github.com/puckiestyle/CVE-2021-1675 | POC详情 |
| 8 | None | https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare | POC详情 |
| 9 | Fix without disabling Print Spooler | https://github.com/tanarchytan/CVE-2021-1675 | POC详情 |
| 10 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) | https://github.com/calebstewart/CVE-2021-1675 | POC详情 |
| 11 | Vulnerability Scanner for CVE-2021-1675/PrintNightmare | https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER | POC详情 |
| 12 | None | https://github.com/thomasgeens/CVE-2021-1675 | POC详情 |
| 13 | None | https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery | POC详情 |
| 14 | None | https://github.com/killtr0/CVE-2021-1675-PrintNightmare | POC详情 |
| 15 | None | https://github.com/corelight/CVE-2021-1675 | POC详情 |
| 16 | A small powershell script to disable print spooler service using desired state configuration | https://github.com/kougyokugentou/CVE-2021-1675 | POC详情 |
| 17 | CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS | https://github.com/ptter23/CVE-2021-1675 | POC详情 |
| 18 | to catch cve-2021-1675-printnightmare | https://github.com/initconf/cve-2021-1675-printnightmare | POC详情 |
| 19 | Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare) | https://github.com/ozergoker/PrintNightmare | POC详情 |
| 20 | Youtube : https://youtu.be/Zr0KjYDSFKQ | https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675 | POC详情 |
| 21 | None | https://github.com/edsonjt81/CVE-2021-1675 | POC详情 |
| 22 | CVE-2021-1675 (PrintNightmare) | https://github.com/sailay1996/PrintNightmare-LPE | POC详情 |
| 23 | Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527 | https://github.com/JumpsecLabs/PrintNightmare | POC详情 |
| 24 | None | https://github.com/bartimusprimed/CVE-2021-1675-Yara | POC详情 |
| 25 | None | https://github.com/k8gege/cve-2021-1675 | POC详情 |
| 26 | CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE) | https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527 | POC详情 |
| 27 | None | https://github.com/thalpius/Microsoft-CVE-2021-1675 | POC详情 |
| 28 | None | https://github.com/zha0/Microsoft-CVE-2021-1675 | POC详情 |
| 29 | None | https://github.com/Winter3un/CVE-2021-1675 | POC详情 |
| 30 | see https://github.com/cube0x0/CVE-2021-1675 | https://github.com/hahaleyile/my-CVE-2021-1675 | POC详情 |
| 31 | PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。 | https://github.com/mstxq17/CVE-2021-1675_RDL_LPE | POC详情 |
| 32 | Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) | https://github.com/ly4k/PrintNightmare | POC详情 |
| 33 | C# PrintNightmare (CVE-2021-1675) | https://github.com/Wra7h/SharpPN | POC详情 |
| 34 | Working PowerShell POC | https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare | POC详情 |
| 35 | Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. | https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler | POC详情 |
| 36 | CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation) | https://github.com/eversinc33/NimNightmare | POC详情 |
| 37 | PrintNightmare Local Privilege Escalation | https://github.com/AndrewTrube/CVE-2021-1675 | POC详情 |
| 38 | None | https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675 | POC详情 |
| 39 | None | https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675 | POC详情 |
| 40 | None | https://github.com/jj4152/cve-2021-1675 | POC详情 |
| 41 | Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527) | https://github.com/r1skkam/PrintNightmare | POC详情 |
| 42 | A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675 | https://github.com/peckre/PNCVE-Win10-20H2-Exploit | POC详情 |
| 43 | None | https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527 | POC详情 |
| 44 | None | https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell- | POC详情 |
| 45 | None | https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675 | POC详情 |
| 46 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/CameraShutterBug/PrintNightmare | POC详情 |
| 47 | None | https://github.com/DLL00P/CVE-2021-1675 | POC详情 |
| 48 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/GlacierGossip/PrintNightmare | POC详情 |
| 49 | None | https://github.com/000Tonio/cve-2021-1675 | POC详情 |
| 50 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/ArtAtrium/PrintNightmare | POC详情 |
| 51 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/VoiidByte/Impacket | POC详情 |
暂无评论