支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 11d5a335018720ca7e46e0a14032f5565914ffa1

来源
关联漏洞
标题:Microsoft Windows DNS Server 输入验证错误漏洞 (CVE-2020-1350)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows DNS Server 存在输入验证错误漏洞,该漏洞源于程序无法正确处理请求。攻击者可通过发送恶意的请求利用该漏洞在本地系统帐户的上下文中运行任意代码。以下产品及版本受到影响:Windows Server 2008 SP2,Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windo
Description
HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.
介绍
# This is an educational exercise. Use at your own risk.

# CVE-2020-1350 Exploit aka SIGRED
## [This is a lesson as to why you should not trust binaries on the internet.](https://blog.zsec.uk/cve-2020-1350-research/), the [workaround fix is genuine](https://github.com/ZephrFish/CVE-2020-1350/blob/master/Fix.bat).
### Workaround Fix
```
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters" /v "TcpReceivePacketSize" /t REG_DWORD /d 0xFF00 /f
net stop DNS && net start DNS
```
- MS Link: https://support.microsoft.com/en-gb/help/4569509/windows-dns-server-remote-code-execution-vulnerability
Microsoft has released the security patch, you can download the patch here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

### Windows Binary PoC
```
./CVE-2020-1350.exe will run the exploit.
```

View README.pdf for more information on how to use the binary.

Source code is available here: https://github.com/zoomerxsec/Fake_CVE-2020-1350


### Running the exploit on Linux

Change the target IP in exploit.sh then do:

```
chmod +x exploit.sh
./exploit.sh
```

## Repo Info
- CVE-2020-1350.exe (sha256sum 9e6da40db7c7f9d5ba679e7439f03ef6aacee9c34f9a3f686d02af34543f2e75) - Benign binary which opens rick roll and pings canary token
- Fix.bat - Batch file that applies the fix from Microsoft
- LICENCE - The licence file, also does nothing
- PoC.exe (sha256sum bf9657ff82065a676bc2aeb07877d5964a193da244e943ee37f08b931c9868b7)-  Benign binary which opens cmd.exe and additionally pings canary token
- README.md - Details the README of the repo
- windows-exploit.ps1 - Rick roll in shell, also benign


### Additional Resources

- https://blog.zsec.uk/cve-2020-1350-honeypoc/ - Statistics from this project
- https://blog.zsec.uk/cve-2020-1350-research/ - Explanation on this project :-)
- https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_exploit_cve_2020_1350.yml - Signa rules for detection
- https://research.checkpoint.com/2020/resolving-your-way-into-domain-admin-exploiting-a-17-year-old-bug-in-windows-dns-servers/ - Vulnerability Writeup
- https://blog.menasec.net/2019/02/threat-hunting-24-microsoft-windows-dns.html - Threathunting the vuln
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350 - CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability
- https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-update-cve-2020-1350-vulnerability-in-windows-domain-name-system-dns-server/ - July 2020 Security Update: CVE-2020-1350 Vulnerability in Windows Domain Name System (DNS) Server
- https://github.com/tinkersec/cve-2020-1350 Tinkersec PoC, also not real

文件快照

[4.0K] /data/pocs/11d5a335018720ca7e46e0a14032f5565914ffa1 ├── [ 31] CONTRIBUTING.md ├── [118K] CVE-2020-1350.exe ├── [ 339] exploit.sh ├── [ 170] Fix.bat ├── [ 17] HoneyPoC.txt ├── [ 34K] LICENCE ├── [285K] PoC.exe ├── [2.6K] README.md ├── [5.0K] README.pdf └── [ 36K] windows-exploit.ps1 0 directories, 10 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。