# Windows代理中的权限提升漏洞
## 漏洞概述
在 Checkmk 版本 2.2.0p23 之前、2.1.0p40 之前以及 2.0.0 (已停止支持) 中的 Windows 代理插件存在权限提升漏洞,允许本地用户提升权限。
## 影响版本
- 2.2.0p23 之前
- 2.1.0p40 之前
- 2.0.0 (已停止支持)
## 漏洞细节
在受影响的 Checkmk 版本中,Windows 代理插件存在权限提升漏洞。本地用户可以通过利用此漏洞提升自身的权限。
## 影响
本地用户能够利用此漏洞将自己的权限提升至更高权限级别,可能导致未经授权的系统访问和操作。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/zhulin837/checkmk_cve-2024-0670 | POC详情 |
| 2 | PoC for CVE-2024-0670 | https://github.com/magicrc/CVE-2024-0670 | POC详情 |
| 3 | This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism. | https://github.com/elsevar11/CVE-2024-0670-CheckMK-Agent-Local-Privilege-Escalation-Exploit | POC详情 |
| 4 | Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_ | https://github.com/fsoc-ghost-0x/Fsociety-CVE-2024-0670-CheckMK-LPE | POC详情 |
| 5 | 🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals. | https://github.com/Nikopmpm/Fsociety-CVE-2024-0670-CheckMK-LPE | POC详情 |
| 6 | 🚀 Utilize this C++ tool for local privilege escalation on CheckMK agents, addressing the CVE-2024-0670 vulnerability effectively. | https://github.com/Nikopmpm/nikopmpm.github.io | POC详情 |
| 7 | CheckMK Agent Local Privilege Escalation (PoC) | https://github.com/tralsesec/CVE-2024-0670 | POC详情 |
暂无评论