Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31166 PoC — Microsoft HTTP.sys 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft HTTP.sys 资源管理错误漏洞 (CVE-2021-31166)
Description:Microsoft HTTP.sys是美国微软(Microsoft)公司的一个应用协议。HTTP应用协议。 HTTP.sys存在资源管理错误漏洞。以下产品和版本受到影响:Windows 10 Version 2004 for 32-bit Systems,Windows 10 Version 2004 for ARM64-based Systems,Windows 10 Version 2004 for x64-based Systems,Windows Server, version 2004 (Ser
Description
Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)
Readme
# CVE-2021-31166-Exploit
Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)

A specially crafted Http request targetting a vulnerable windows version will result into DOS attack. And the server will be rebooted with blue screen error.
Http.sys is a windows kernel driver responsible for handling http requests and crafting a response for those.
This vulnerable http.sys driver can't handle crafted "Accept-Encoding" header, and gets crashed. Resultantly, the server will reboot.
On the blue screen, we can see error with "Stop Code: KERNEL SECURITY CHECK FAILED"
This is a critical vulnerability with CVSS 9.8, easy to exploit.

Vulnerable windows versions:
Windows 10, and Windows Server 2016 (20h2 and 2004 releases for both)

More Ref:

https://nvd.nist.gov/vuln/detail/CVE-2021-31166

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31166
File Snapshot

[4.0K] /data/pocs/3356a83e067f91082ddc31f3c9e08110bed35f8e ├── [ 444] CVE-2021-31166.py ├── [ 34K] LICENSE └── [ 877] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.