Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24644 PoC — ZZ Inc. KeyMouse Windows 安全漏洞

Source
Associated Vulnerability
Title:ZZ Inc. KeyMouse Windows 安全漏洞 (CVE-2022-24644)
Description:ZZ Inc. KeyMouse Windows是ZZ Inc.的一个键盘鼠标。 ZZ Inc. KeyMouse Windows 3.08 及更早版本存在安全漏洞,该漏洞源于在未经身份验证的更新期间受到远程代码执行漏洞的影响。
Readme
# CVE-2022-24644
> ZZ Inc. KeyMouse 3.08 (Windows) Unauthenticated Update Remote Code Execution Vulnerability

Usage: `python3 cve-2022-24644_poc.py`

Details in the report at [gerr.re](https://gerr.re/posts/cve-2022-24644/).

## Steps to reproduce
1. Install [KeyMouse Windows 3.08](http://www.keymouse.com/downloads/windows/keymouse-setup3.08.exe);
2. Set spoof `www.keymouse.com` to our attacker ip;
    * For the proof-of-concept it is easiest to edit `c:\windows\system32\drivers\etc\hosts` on the target.
        - Attackers may e.g. use:
            + poorly configured routers/switches/DNS
            + DNS cache poisoning
            + ARP cache poisoning
3. Compile `proof.c` on the attacker, e.g. using `i686-w64-mingw32-gcc proof.c -o proof.exe`;
```c
#include <windows.h>
int main(int argc, char const *argv[]){	
	WinExec("cmd.exe",1);
	return TRUE;
}
```
4. Run the proof-of-concept script on the attacker;
5. Start KeyMouse on the target and trigger an update:
    * Application Menu: Help -> Check For Updates
    * Task Bar: right mouse button on task bar icon -> Check Updates (or Install Updates)
6. Continue with the update.

As a result, `proof.exe` is executed in the context of the Administrator user at high integrity.

File Snapshot

[4.0K] /data/pocs/794f3c1ea29594cc4a63365508d0669df9fedb48 ├── [1.1K] cve-2022-24644_poc.py ├── [2.0M] cve-2022-24644_public-advisory.pdf ├── [ 100] proof.c └── [1.2K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.