关联漏洞
Description
CVE-2024-57394
介绍
# CVE-2024-57394
A vulnerability was identified in the Qi-ANXIN Tianqing Endpoint Security Management System (tested on version 10.0). This vulnerability allows low-privilege users to restore a quarantined file to an arbitrary location, such as `C:\Windows\System32`.
An attacker can craft a malicious DLL file, restore it to `C:\Windows\System32`, and exploit known DLL hijacking vulnerabilities (e.g., LPE via StorSvc) to escalate privileges to SYSTEM.
# Reproduced Steps
Craft a malicious DLL named `sprintcsp.dll` that executes malicious commands.

Land the DLL on the target machine, the file gets quarantined.

Restore and trust the file in the EDR client.

File is successfully written to `C:\Windows\System32`.

Create `RpcClient.exe`, which leverage a DLL hijacking vulnerability in the StorSvc service to execute the malicious DLL `sprintcsp.dll`.
As a proof of concept, the DLL will create a service named `abc` and execute the binary at `C:\Users\Public\test.exe` as SYSTEM.

Reference: https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc
文件快照
[4.0K] /data/pocs/24c6d176ebb845e6d45e26cee3c6c1f5e9d65890
└── [1.5K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。