Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-34527 PoC — Microsoft Windows Print Spooler Components 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Print Spooler Components 安全漏洞 (CVE-2021-34527)
Description:Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler Components 存在安全漏洞,攻击者可以通过该漏洞绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1
Description
To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)
Readme
# PrintNightmare

Here is a project that will help to fight against Windows security breach PrintNightmare! (CVE-2021-34527)

You have to know that a patch has been released by Microsoft against this breach but is not fully functional and fight only RCE (Remote code execution) while LPE (Local privilege elevation) is still working for potential attackers.


Here are some things to do :
-

- First of all, on a client, you NEED to update your computer with last microsoft fixs even if it is not fully patching.
- Then, on a server, if installing the microsoft patch is not possible, you HAVE TO switch off then disable at startup the Windows Print Spooler Service via Services.msc or via 2 Powershell commands :
       "Stop-Service -Name Spooler -Force"  and  "Set-Service -Name Spooler -StartupType Disabled".
- Launch the script powershell or batch that will update or create 3 registry keys : 
    - RegisterSpoolerRemoteRpcEndPoint with value 2 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers 
    - NoWarningNoElevationOnInstall with value 0 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint 
    - UpdatePromptSettings with value 0 (DWORD) at HKLM:\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint
 
 Sources
 -
 I created this protocol with help of many websites tracing the breach : 
 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
 - https://kb.cert.org/vuls/id/383432
 - https://wccftech.com/windows-printnightmare-patch-requires-additional-registry-settings/
 - https://www.ghacks.net/2021/07/03/workaround-for-the-windows-print-spooler-remote-code-execution-vulnerability/
File Snapshot

[4.0K] /data/pocs/903def9914f35000884d89441a6bd0b4d57a10b0 ├── [182K] PrintNightmare Flowchart.png ├── [1.6K] README.md ├── [ 786] Script_PrintNightmare_Batch.bat └── [2.2K] Script_PrintNightmare_PShell.ps1 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.