目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2024-57394 PoC — QiANXIN Tianqing Endpoint Security Management System 安全漏洞

来源
关联漏洞
标题:QiANXIN Tianqing Endpoint Security Management System 安全漏洞 (CVE-2024-57394)
Description:QiANXIN Tianqing Endpoint Security Management System是中国奇安信(QiANXIN)公司的 QiANXIN Tianqing Endpoint Security Management System v10.0版本存在安全漏洞,该漏洞源于隔离恢复功能允许将恶意文件恢复到任意文件路径,可能导致权限提升。
Description
CVE-2024-57394
介绍
# CVE-2024-57394
A vulnerability was identified in the Qi-ANXIN Tianqing Endpoint Security Management System (tested on version 10.0). This vulnerability allows low-privilege users to restore a quarantined file to an arbitrary location, such as `C:\Windows\System32`.
An attacker can craft a malicious DLL file, restore it to `C:\Windows\System32`, and exploit known DLL hijacking vulnerabilities (e.g., LPE via StorSvc) to escalate privileges to SYSTEM.

# Reproduced Steps
Craft a malicious DLL named `sprintcsp.dll` that executes malicious commands.
![image](https://github.com/user-attachments/assets/5f2fc1e8-29d1-4d94-982e-b7aa60f3c5d7)

Land the DLL on the target machine, the file gets quarantined.
![image](https://github.com/user-attachments/assets/3f9cd22f-914d-4643-b581-59029717ca2c)

Restore and trust the file in the EDR client.
![image](https://github.com/user-attachments/assets/539dd2e6-e284-4c99-a142-a84c2168f88c)

File is successfully written to `C:\Windows\System32`.
![image](https://github.com/user-attachments/assets/fe638b0c-1b0a-42b1-800a-0c12c11d2dcb)

Create `RpcClient.exe`, which leverage a DLL hijacking vulnerability in the StorSvc service to execute the malicious DLL `sprintcsp.dll`.
As a proof of concept, the DLL will create a service named `abc` and execute the binary at `C:\Users\Public\test.exe` as SYSTEM.
![image](https://github.com/user-attachments/assets/df7197b0-ed12-4aa2-b222-09183e59402f)
Reference: https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc


文件快照

[4.0K] /data/pocs/24c6d176ebb845e6d45e26cee3c6c1f5e9d65890 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。