关联漏洞
描述
Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)
介绍
# Follina-MSDT-Vulnerability-CVE-2022-30190-
Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)
For detail inormatin about Follina-MSDT-Vulnerability-CVE-2022-30190- visit https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
## How to Use the follina.ps1 script
1) Download the script and move it to C drive in your windows machine
2) Run Windows PowerShell as Administrator and Run the script
```bash
.\folina.ps1
```
This script has three features
1) It will Check the system to see if the MSDT URL Protocol is still enabled
2) Then the scipt will tell whether or not your machine is vulnerable to the Follina vunerability CVE-2022-30190 and would you like to disable MSDT URL Protocol and backup the registry key.
3) If your machine is not Vulnerable because of the absence of registry key , it will ask you whether or not you want to import back the registry key for future use or testing purposes

To import the key , run the script again!!!

文件快照
[4.0K] /data/pocs/0b42c09fc17b1b70e0b58a813703c8f51d93bbfb
├── [2.5K] follina.ps1
├── [1.0K] LICENSE
└── [1.3K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。