Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36934 PoC — Microsoft Windows 访问控制错误漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 访问控制错误漏洞 (CVE-2021-36934)
Description:Microsoft Windows是美国微软(Microsoft)公司的一种桌面操作系统。 Microsoft Windows 存在访问控制错误漏洞,该漏洞源于系统对多个系统文件的访问控制列表过于宽松,因此存在特权提升漏洞。成功利用此漏洞的攻击者可以使用SYSTEM权限运行任意代码。
Description
CVE-2021-36934 PowerShell scripts
Readme
# CVE-2021-36934
CVE-2021-36934 PowerShell scripts

* Detection.ps1

This is a quick and dirty script to see if a machine may be vulnerable. It writes out a message to the shell indicating if BUILTIN\Users was detected in the permission list and includes the current permissions on the SAM path for validation.

If the system is unaffected or has been remediated you would see output similar to below - 

![Alt text](/PermissionsNotDetected.png?raw=true "PermissionsNotDetected")


* SCCM-Detection.ps1

This is a basic PowerShell script for use in SCCM configuration items. It will be used to validate whether a client is affected by this CVE.

* SCCM-Remediation.ps1

This is a basic PowerShell script for use in SCCM configuration items. It will remediate affected systems by resetting the permissions and removing any existing VSS shadow copies.
File Snapshot

[4.0K] /data/pocs/31291bf45f777c2c764fb1836537176018ab1d64 ├── [ 864] Detection.ps1 ├── [ 34K] LICENSE ├── [ 30K] PermissionsNotDetected.png ├── [ 850] README.md ├── [ 450] SCCM-Detection.ps1 └── [ 470] SCCM-Remediation.ps1 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.