关联漏洞
标题:多款Microsoft产品访问控制错误漏洞 (CVE-2017-8464)Description:Microsoft Windows等都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows XP是一套PC和平板电脑使用的操作系统。Windows是一种桌面操作系统。 Microsoft Windows中的Windows Shell中存在访问控制错误漏洞。攻击者可借助特制的.LNK文件利用该漏洞执行任意代码。以下版本受到影响:Microsoft Windows Server 2008 SP2和R2 SP1,Windo
介绍
# CVE-2017-8464-EXP
Support x86 and x64
Just for test
Lnk file from:
https://github.com/rapid7/metasploit-framework/pull/8767
Thanks to ykoster
Small change,replace the dll file,fix the bug of crashing explorer.exe.(ykoster has fixed this bug)
POC:
x86:

x64:

If you can determine the USB drive,one LNK file is enough,like this:

More details:
https://3gstudent.github.io/3gstudent.github.io/Windows-Lnk%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2017-8464)%E5%88%A9%E7%94%A8%E6%B5%8B%E8%AF%95/
文件快照
[4.0K] /data/pocs/30334f9e91b366d9f9f5772ed68cfec57de448de
├── [4.0K] calc x64
│ ├── [ 240] bzimVhTxVSVAvqWW_H.lnk
│ ├── [ 240] CJqsRymyTEMnBoEC_T.lnk
│ ├── [ 240] emeDxGEdARUmzHYN_X.lnk
│ ├── [ 240] FavqRrpXeqruoJwm_M.lnk
│ ├── [ 240] gBsceXqQIqhXHySi_N.lnk
│ ├── [ 240] gzTXwmTukBDryAPx_L.lnk
│ ├── [ 240] hRAVeKFdQFfUWWqf_D.lnk
│ ├── [ 240] joJczkptYQtfkMNm_J.lnk
│ ├── [ 240] juHLixrdaEoaGDcL_I.lnk
│ ├── [ 240] laTnMsKakEOKsJHf_R.lnk
│ ├── [ 240] LdhMQIbWZpcSeVNj_Z.lnk
│ ├── [ 240] lvdfRmNKdkMexTNn_G.lnk
│ ├── [ 240] NfMIupIogETQsWra_V.lnk
│ ├── [ 49K] OuWZjtdbLqFVMSLF.dll
│ ├── [ 240] QZwHXICgEbiMtEwe_S.lnk
│ ├── [ 240] TeNENqdfbnkTNers_O.lnk
│ ├── [ 240] TFjoAQJOJqTTlynz_W.lnk
│ ├── [ 240] TpzgiaCNXaSnzlKx_K.lnk
│ ├── [ 240] TywZFloXXLcMoUVP_P.lnk
│ ├── [ 240] VhfYGmTcCCcrfTaY_Y.lnk
│ ├── [ 240] vnvlkoVTAEtCfPYX_Q.lnk
│ ├── [ 240] xWiOFoWnpbAxeKSr_U.lnk
│ ├── [ 240] YSfBenPxsQHppZuM_E.lnk
│ └── [ 240] ZMLUEPWbhtajeFvU_F.lnk
├── [4.0K] calc x86
│ ├── [ 240] AIGrEPvEOTXqjEaw_O.lnk
│ ├── [ 240] aQRlCerEgjVIRYLQ_N.lnk
│ ├── [ 240] cRTvZQMkUULYLGmW_F.lnk
│ ├── [ 240] DNfOzAatoSkUAZpM_E.lnk
│ ├── [ 240] FNqWxGJfjXHWtsOf_S.lnk
│ ├── [ 240] fXtYTHUBPuuoBWrl_P.lnk
│ ├── [ 240] gXRyeJymkCbmiXIR_H.lnk
│ ├── [ 240] gyhbcKquCWLSOUSd_U.lnk
│ ├── [ 240] iWYfETBuIkffMlgp_Z.lnk
│ ├── [ 240] lHGRXkTVRihDzkjl_R.lnk
│ ├── [ 240] lPfkoJiWxgsoSrsD_V.lnk
│ ├── [ 240] LqFWHUlZTWlULatC_G.lnk
│ ├── [ 240] MkGTeIIFLYOjZclX_I.lnk
│ ├── [ 240] nChCLwgSBXaEiwIR_Q.lnk
│ ├── [ 240] qIeuxAOnUEVJWOEe_K.lnk
│ ├── [ 240] QjcZPYwkZKEVQvgs_W.lnk
│ ├── [ 240] rxTDIbsrdXcyLvYA_Y.lnk
│ ├── [ 240] SAmbRRbbdmzXwBQm_J.lnk
│ ├── [ 240] SDtTgoPxAguJyxBw_T.lnk
│ ├── [ 240] sHEofvMNSNPGPxnI_X.lnk
│ ├── [ 240] uZfBVEFQdlRgsvpT_D.lnk
│ ├── [ 240] wDxKJhyBflVPXlwA_L.lnk
│ ├── [3.0K] WmOXSshkpQfaLVED.dll
│ └── [ 240] xXIRjCUwUvcECnmO_M.lnk
├── [1.5K] LICENSE
├── [ 52K] poc1.png
├── [ 810] README.md
├── [751K] x64.gif
└── [750K] x86.gif
2 directories, 53 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。