支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 14a122c42bb513f85040c1908be3d5a0514f8b18

来源
关联漏洞
标题:Microsoft Windows和Microsoft Windows Server 安全漏洞 (CVE-2019-1476)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Microsoft Windows Server中存在提权漏洞,该漏洞源于AppX Deployment Service (AppXSVC)没有正确地处理硬链接。攻击者可通过登录到系统并运行特制的应用程序利用
Description
AppXSvc Arbitrary File Overwrite DoS
介绍
# CVE-2019-1476

## AppXSvc Arbitrary File Overwrite DoS

I have independently reported this vulnerability to MSRC as part of my research inspired by [CVE-2019-0841](https://github.com/rogue-kdc/CVE-2019-0841) originally reported by [Nabeel Ahmed](https://twitter.com/rogue_kdc). This vulnerability allows a regular user to overwrite arbitrary files. However, the attacker's capabilities are limited, due to the lack of control over the file's content, hence it's most likely usage is in various denial of service scenarios. See [Arbitrary file overwrite in AppXSvc](https://www.seljan.hu/posts/arbitrary-file-overwrite-in-appxsvc/) for more information.

![Video PoC](https://github.com/sgabe/CVE-2019-1476/blob/master/AppXSvcDoS.gif)
文件快照

[4.0K] /data/pocs/14a122c42bb513f85040c1908be3d5a0514f8b18 ├── [4.0K] AppXSvcDoS │   ├── [6.0K] AppXSvcDoS.cpp │   ├── [2.9K] AppXSvcDoS.rc │   ├── [7.5K] AppXSvcDoS.vcxproj │   ├── [1.4K] AppXSvcDoS.vcxproj.filters │   ├── [ 384] AppXSvcDoS.vcxproj.user │   ├── [2.3K] base64.cpp │   ├── [ 374] base64.h │   ├── [3.5K] CommonUtils.cpp │   ├── [ 658] CommonUtils.h │   ├── [2.2K] ntimports.h │   ├── [ 293] stdafx.cpp │   ├── [ 301] stdafx.h │   ├── [ 306] targetver.h │   └── [1.3K] typed_buffer.h ├── [502K] AppXSvcDoS.gif ├── [ 58K] AppXSvcDoS.png ├── [1.3K] AppXSvcDoS.sln └── [ 741] README.md 1 directory, 18 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。