A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files and a low privileged user.# CVE-2020-14974
A simple POC that demonstrates A vulnerability found in IObitUnlocker 1.1.2 that leverages IOCTL codes found it its vulnerable driver (IObitUnlocker.sys), providing ability to unlock, delete, rename, copy, and move running files as a low privileged user.
## Resources
https://nvd.nist.gov/vuln/detail/CVE-2020-14974
https://theevilbit.github.io/posts/iobit_unlocker_lpe/
[4.0K] /data/pocs/21498440b74958532d4858f0d8efc329401d2387
├── [4.0K] IObitUnlocker
│ ├── [4.0K] Header Files
│ │ └── [1.0K] IObitUnlocker.hpp
│ ├── [6.9K] IObitUnlocker.vcxproj
│ ├── [1.3K] IObitUnlocker.vcxproj.filters
│ ├── [ 165] IObitUnlocker.vcxproj.user
│ ├── [4.0K] Resource Files
│ │ └── [397K] IObitDriver.hpp
│ └── [4.0K] Source Files
│ ├── [9.3K] IObitUnlocker.cpp
│ └── [ 257] Main.cpp
├── [1.4K] IObitUnlocker.sln
└── [ 390] README.md
4 directories, 9 files