Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24491 PoC — Microsoft Windows Network File System代码注入漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Network File System代码注入漏洞 (CVE-2022-24491)
Description:Microsoft Windows Network File System是美国微软(Microsoft)公司的一种文件共享解决方案,可让您使用 NFS 协议在运行 Windows Server 和 UNIX 操作系统的计算机之间传输文件。 Microsoft Windows Network File System存在代码注入漏洞。以下产品和版本受到影响:Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for AR
Description
A Zeek CVE-2022-24491 detector.
Readme
CVE-2022-24491
=================================

A Zeek detector for CVE-2022-24491:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24491

This detector will generate a notice if it sees a portmap set
and dump, an action performed when exploiting CVE-2022-24491.

Example:

```
#separator \x09
#set_separator	,
#empty_field	(empty)
#unset_field	-
#path	notice
#open	2022-04-13-20-55-55
#fields	ts	uid	id.orig_h	id.orig_p	id.resp_h	id.resp_p	fuid	file_mime_type	file_desc	proto	note	msg	sub	src	dst	p	n	peer_descr	actions	email_dest	suppress_for	remote_location.country_code	remote_location.region	remote_location.city	remote_location.latitude	remote_location.longitude
#types	time	string	addr	port	addr	port	string	string	string	enum	enum	string	string	addr	addr	port	count	string	set[enum]	set[string]	interval	string	string	string	double	double
1649715078.678609	C4J4Th3PJpwUYZZ6gc	192.168.88.146	63839	192.168.88.157	111	-	-	-	udp	CVE202224491::POTENTIAL_CVE_2022_24491	Possible CVE-2022-24491 exploit attempt.  An RPC portmap set with a RPC portmap dump was observed.	-	192.168.88.146	192.168.88.157	111	-	-	Notice::ACTION_LOG	(empty)	3600.000000	-	-	-	-	-
#close	2022-04-13-20-55-55
```
File Snapshot

[4.0K] /data/pocs/2ae464e13a487da15f16603008697d19cfd14e62 ├── [ 135] CHANGES ├── [ 49] COPYING ├── [1.5K] LICENSE ├── [1.2K] README.md ├── [4.0K] scripts │   ├── [1.6K] cve_2022_24491.sig │   ├── [ 45] __load__.zeek │   └── [1.5K] main.zeek ├── [4.0K] testing │   ├── [4.0K] Baseline │   │   └── [4.0K] cve202224491.run-pcap │   │   ├── [ 18K] conn.log │   │   ├── [1.0K] notice.log │   │   └── [ 115] output │   ├── [ 565] btest.cfg │   ├── [4.0K] cve202224491 │   │   └── [ 258] run-pcap.zeek │   ├── [4.0K] Files │   │   └── [ 192] random.seed │   ├── [ 28] Makefile │   ├── [4.0K] Scripts │   │   ├── [ 383] diff-remove-timestamps │   │   ├── [1.3K] get-zeek-env │   │   └── [ 303] README │   └── [4.0K] Traces │   └── [127K] CVE-2022-24491.pcap └── [ 297] zkg.meta 8 directories, 19 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.