# Windows权限提升漏洞
## 漏洞概述
由于多个系统文件(包括安全账户管理器(SAM)数据库)的访问控制列表(ACL)过于宽松,存在权限提升漏洞。成功利用此漏洞的攻击者可以以SYSTEM权限运行任意代码。
## 影响版本
未指定具体版本,但涉及使用SAM数据库的系统。
## 漏洞细节
攻击者必须具备在目标系统上执行代码的能力,才能利用此漏洞。成功利用此漏洞的攻击者可以安装程序、查看、更改或删除数据、或创建具有完全用户权限的新账户。
## 影响
攻击者可以利用该漏洞提升其在系统中的权限。仅为安装安全更新并不会完全缓解此漏洞,还必须手动删除所有系统文件(包括SAM数据库)的影子副本。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation | https://github.com/HuskyHacks/ShadowSteal | POC详情 |
2 | Fix for the CVE-2021-36934 | https://github.com/JoranSlingerland/CVE-2021-36934 | POC详情 |
3 | Detection and Mitigation script for CVE-2021-36934 (HiveNightmare aka. SeriousSam) | https://github.com/n3tsurge/CVE-2021-36934 | POC详情 |
4 | Small and dirty PoC for CVE-2021-36934 | https://github.com/Wh04m1001/VSSCopy | POC详情 |
5 | PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer | https://github.com/WiredPulse/Invoke-HiveNightmare | POC详情 |
6 | HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934 | https://github.com/romarroca/SeriousSam | POC详情 |
7 | A capability to identify and remediate CVE-2021-36934 (HiveNightmare) | https://github.com/WiredPulse/Invoke-HiveDreams | POC详情 |
8 | CVE-2021-36934 PowerShell Fix | https://github.com/tda90/CVE-2021-36934 | POC详情 |
9 | Windows Elevation of Privilege Vulnerability (SeriousSAM) | https://github.com/VertigoRay/CVE-2021-36934 | POC详情 |
10 | CVE-2021-36934 PowerShell scripts | https://github.com/bytesizedalex/CVE-2021-36934 | POC详情 |
11 | C# PoC for CVE-2021-36934/HiveNightmare/SeriousSAM | https://github.com/Preventions/CVE-2021-36934 | POC详情 |
12 | PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3 | https://github.com/Sp00p64/PyNightmare | POC详情 |
13 | This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934 https://kb.cert.org/vuls/id/506989 USE AT YOUR OWN RISK -- BACKUPS MAY BREAK. | https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM | POC详情 |
14 | None | https://github.com/0x0D1n/CVE-2021-36934 | POC详情 |
15 | HiveNightmare aka SeriousSAM | https://github.com/exploitblizzard/CVE-2021-36934 | POC详情 |
16 | CVE-2021-36934 HiveNightmare vulnerability checker and workaround | https://github.com/irissentinel/CVE-2021-36934 | POC详情 |
17 | SeriousSAM Auto Exploiter | https://github.com/websecnl/CVE-2021-36934 | POC详情 |
18 | POC experiments with Volume Shadow copy Service (VSS) | https://github.com/grishinpv/poc_CVE-2021-36934 | POC详情 |
19 | Windows Elevation of Privilege Vulnerability CVE-2021-36934 | https://github.com/shaktavist/SeriousSam | POC详情 |
20 | None | https://github.com/OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC | POC详情 |
21 | Exploit for CVE-2021-36934 | https://github.com/chron1k/oxide_hive | POC详情 |
22 | PoC for CVE-2021-36934 Aka HiveNightmare/SeriousSAM written in python3 | https://github.com/Sp00kySkelet0n/PyNightmare | POC详情 |
23 | PoC malware that uses exploit CVE-2021-36934 (improper ACLs on shadow copies) using a fileless red team method on Windows 10/11 with LOLBins, extracting SYSTEM and SAM hives for local NTLM hashes. | https://github.com/P1rat3R00t/Why-so-Serious-SAM | POC详情 |
暂无评论