POC详情: 903def9914f35000884d89441a6bd0b4d57a10b0

来源
关联漏洞
标题: Microsoft Windows Print Spooler Components 安全漏洞 (CVE-2021-34527)
描述:Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler Components 存在安全漏洞,攻击者可以通过该漏洞绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1
描述
To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)
介绍
# PrintNightmare

Here is a project that will help to fight against Windows security breach PrintNightmare! (CVE-2021-34527)

You have to know that a patch has been released by Microsoft against this breach but is not fully functional and fight only RCE (Remote code execution) while LPE (Local privilege elevation) is still working for potential attackers.


Here are some things to do :
-

- First of all, on a client, you NEED to update your computer with last microsoft fixs even if it is not fully patching.
- Then, on a server, if installing the microsoft patch is not possible, you HAVE TO switch off then disable at startup the Windows Print Spooler Service via Services.msc or via 2 Powershell commands :
       "Stop-Service -Name Spooler -Force"  and  "Set-Service -Name Spooler -StartupType Disabled".
- Launch the script powershell or batch that will update or create 3 registry keys : 
    - RegisterSpoolerRemoteRpcEndPoint with value 2 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers 
    - NoWarningNoElevationOnInstall with value 0 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint 
    - UpdatePromptSettings with value 0 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
 
 Sources
 -
 I created this protocol with help of many websites tracing the breach : 
 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
 - https://kb.cert.org/vuls/id/383432
 - https://wccftech.com/windows-printnightmare-patch-requires-additional-registry-settings/
 - https://www.ghacks.net/2021/07/03/workaround-for-the-windows-print-spooler-remote-code-execution-vulnerability/
文件快照

[4.0K] /data/pocs/903def9914f35000884d89441a6bd0b4d57a10b0 ├── [182K] PrintNightmare Flowchart.png ├── [1.6K] README.md ├── [ 786] Script_PrintNightmare_Batch.bat └── [2.2K] Script_PrintNightmare_PShell.ps1 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。