Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
Metasploit module for CVE-2019-0708 (BlueKeep) - https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp
Readme
# CVE-2019-0708 (Bluekeep)

Metasploit module for CVE-2019-0708 (BlueKeep)

Pulled from https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp
and fixed

## File copy instructions
1. Make a folder named 'rdp' in /usr/share/metasploit-framework/modules/exploits/windows/
2. Copy the files 'cve_2019_0708_bluekeep_rce.rb' in the folder
3. Replace the files in following folders:
   - rdp.rb --> /usr/share/metasploit-framework/lib/msf/core/exploit/
   - rdp_scanner.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp
   - cve_2019_0708_bluekeep.rb --> /usr/share/metasploit-framework/modules/auxiliary/scanner/rdp

## Runtime
``use exploit/windows/rdp/cve_2019_0708_bluekeep_rce``


## Use for research only
I did not write this code nor do I endorse any illegal activity using this code - this is for security research only.
File Snapshot

[4.0K] /data/pocs/2f7c028ed3e854bd57a695accd264bedf295c552 ├── [ 39K] cve_2019_0708_bluekeep_rce.rb ├── [ 48K] rdp_bluekeep.py ├── [ 46K] rdp.rb ├── [3.0K] rdp_scanner.rb └── [ 909] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.