关联漏洞
介绍
# CVE-2022-24644
> ZZ Inc. KeyMouse 3.08 (Windows) Unauthenticated Update Remote Code Execution Vulnerability
Usage: `python3 cve-2022-24644_poc.py`
Details in the report at [gerr.re](https://gerr.re/posts/cve-2022-24644/).
## Steps to reproduce
1. Install [KeyMouse Windows 3.08](http://www.keymouse.com/downloads/windows/keymouse-setup3.08.exe);
2. Set spoof `www.keymouse.com` to our attacker ip;
* For the proof-of-concept it is easiest to edit `c:\windows\system32\drivers\etc\hosts` on the target.
- Attackers may e.g. use:
+ poorly configured routers/switches/DNS
+ DNS cache poisoning
+ ARP cache poisoning
3. Compile `proof.c` on the attacker, e.g. using `i686-w64-mingw32-gcc proof.c -o proof.exe`;
```c
#include <windows.h>
int main(int argc, char const *argv[]){
WinExec("cmd.exe",1);
return TRUE;
}
```
4. Run the proof-of-concept script on the attacker;
5. Start KeyMouse on the target and trigger an update:
* Application Menu: Help -> Check For Updates
* Task Bar: right mouse button on task bar icon -> Check Updates (or Install Updates)
6. Continue with the update.
As a result, `proof.exe` is executed in the context of the Administrator user at high integrity.
文件快照
[4.0K] /data/pocs/794f3c1ea29594cc4a63365508d0669df9fedb48
├── [1.1K] cve-2022-24644_poc.py
├── [2.0M] cve-2022-24644_public-advisory.pdf
├── [ 100] proof.c
└── [1.2K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。