Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29988 PoC — Microsoft SmartScreen 安全漏洞

Source
Associated Vulnerability
Title:Microsoft SmartScreen 安全漏洞 (CVE-2024-29988)
Description:Microsoft SmartScreen是美国微软(Microsoft)公司的一项由 Microsoft 开发的安全技术,旨在帮助用户识别和阻止潜在的恶意软件和网络钓鱼攻击。 Microsoft SmartScreen存在安全漏洞。攻击者利用该漏洞可以绕过某些功能。以下产品和版本受到影响:Windows 10 Version 22H2 for ARM64-based Systems,Windows 10 Version 22H2 for 32-bit Systems,Windows 11 Version
Description
Exploit for Microsoft SmartScreen malicious execution (april 2024)
Readme
# CVE-2024-29988-exploit
Exploit for Microsoft SmartScreen malicious execution (april 2024)

## Description
A critical vulnerability, CVE-2024-29988, has been discovered in Microsoft's April 2024 Patch Tuesday release. 
This vulnerability allows threat actors to bypass Microsoft's Mark of the Web (MotW) feature, enabling them to execute arbitrary code. 
Peter Girnus, a senior threat researcher at Trend Micro's Zero Day Initiative (ZDI), has observed attackers leveraging this vulnerability in the wild.

Microsoft SmartScreen Prompt contains a security feature bypass vulnerability that allows an attacker to bypass the Mark of the Web (MotW) feature. 
This vulnerability can be chained with CVE-2023-38831 and CVE-2024-21412 to execute a malicious file.

## Published Date: 03.05.2024

## 🔥 CVSS Score: 10/10

## Details of CVE
To exploit CVE-2024-29988, attackers utilize a zipped file containing the exploit code and payload to evade EDR/NDR detection. 
The exploit is sent to the target, whereupon extraction and execution of the payload, the vulnerability allows bypassing MotW. 
Attackers can then execute desired commands or payloads with the bypassed security controls.

## Running Instructions
To execute the exploit, use the provided Python script with the following command:

```python
python3 exploit.py -t http://10.10.10.10 -c 'command'
```

Before running the exploit, refer to the README.txt file in the repository for detailed instructions.

## Disclaimer
For educational purposes only.
File Snapshot

[4.0K] /data/pocs/7edd2f14944c552f683523efb560a0e5e39927d5 ├── [4.4K] CVE-2024-29988.py ├── [1.0K] LICENSE └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.