Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1015 PoC — Microsoft Windows User-Mode Power Service 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows User-Mode Power Service 安全漏洞 (CVE-2020-1015)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows User-Mode Power Service中处理内存对象的方法存在提权漏洞。攻击者可借助特制的应用程序利用该漏洞以提升的权限执行任意代码。以下产品及版本受到影响:Microsoft Windows 7 SP1,Windows 8.1,Windows RT 8.1,Windows 10,Windows 10 1607版本,Windows 10 1709版本,Windo
Description
PoC for CVE-2020-1015
Readme
# CVE-2020-1015
PoC for CVE-2020-1015

More detail available [here](https://0xeb-bp.github.io/blog/2020/05/12/cve-2020-1015-analysis.html)

To compile:
1. Create an empty C++ project in Visual Studio.
2. Add `cve_2020_1015.cpp` and `Source.idl` to the project as source files.
3. Compile `Source.idl`. This will generate three files: `Source_c.c`, `Source_h.h` and `Source_s.c`. 
4. Add the first two as source files to the project. 
5. Add `rpcrt4.lib` as an additional dependency to the project
6. Build! 
File Snapshot

[4.0K] /data/pocs/7206319122ff97000bf009f29d6d470727afde21 ├── [3.7K] cve_2020_1015.cpp ├── [ 508] README.md └── [4.8K] Source.idl 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.