Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1405 PoC — Microsoft Windows UPnP Service 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows UPnP Service 安全漏洞 (CVE-2019-1405)
Description:Microsoft Windows UPnP是美国微软(Microsoft)公司的一个设备代理。提供一个代理允许Windows网络连接识别ZoneDirector的IP地址。 Microsoft Windows UPnP Service中存在安全漏洞。攻击者可通过登录到受影响的系统并运行特制的脚本或应用程序利用该漏洞以提升的系统权限运行任意代码。以下产品及版本受到影响:Microsoft Windows 10,Windows 10版本1607,Windows 10版本1709,Windows 10版本18
Description
Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
Readme
# COMahawk
**Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322**

## Video Demo
https://vimeo.com/373051209

## Usage

### Compile or Download from Release (https://github.com/apt69/COMahawk/releases)

1. Run COMahawk.exe
2. ???
3. Hopefully profit

or

1. COMahawk.exe "custom command to run" (ie. COMahawk.exe "net user /add test123 lol123 &")
2. ???
3. Hopefully profit

## Concerns
**MSDN mentioned that only 1803 to 1903 is vulnerable to CVE-2019-1322. If it doesn't work, maybe it was patched.**

However, it is confirmed that my 1903 does indeed have this bug so maybe it was introduced somewhere inbetween. YMMV.

Also, since you are executing from a service - you most likely cannot spawn any Window hence all command will be "GUI-less". Maybe different session? Idk, it is too late and I am tired haha.

## Credits:
https://twitter.com/leoloobeek for helping me even when he doesn't even have a laptop

https://twitter.com/TomahawkApt69 for being the mental support and motivation

and most of all:

https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/

for discovering and publishing the write up. 100% of the credit goes here.
File Snapshot

[4.0K] /data/pocs/3cc971163fd1240f779ef4941d065a23d8dfa6f1 ├── [4.0K] COMahawk │   ├── [2.9K] COMahawk.cpp │   ├── [7.4K] COMahawk.vcxproj │   └── [ 943] COMahawk.vcxproj.filters ├── [1.4K] COMahawk.sln └── [1.3K] README.md 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.