关联漏洞
标题:Microsoft Windows Server Message Block 安全漏洞 (CVE-2020-1301)Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Server Message Block是其中的一个服务器信息传输协议。 Microsoft Windows SMB(1.0版本)服务器中处理某些请求的方式存在远程代码执行漏洞。攻击者可借助特制数据包利用该漏洞在目标系统上执行代码。以下产品及版本
Description
POC exploit for SMBLost vulnerability (CVE-2020-1301)
介绍
# CVE-2020-1301
POC exploit for SMBLost vulnerability (CVE-2020-1301)
## Affected version
Refer here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1301
## Steps to reproduce
* Make sure SMB/CIFF service feature is turned on target.
* SMB1 must be supported by target. Refer here: https://docs.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
* Target must have C:\ driver shared
## Running the exploit
`exploit.py -t <target> -u <username> -p <password>`
<br/>
username and password are not required in case of target machine has no credentials set.
## Outcome
Will cause BSOD (Blue screen of death)
<br/>
***Code execution comming soon.***
## Source and Credits
https://airbus-cyber-security.com/diving-into-the-smblost-vulnerability-cve-2020-1301/
## POC video
<a href="http://www.youtube.com/watch?feature=player_embedded&v=zVHsKPwtPo4" target="_blank"><img src="http://img.youtube.com/vi/zVHsKPwtPo4/0.jpg"
alt="POC video" width="240" height="180" border="10" /></a>
文件快照
[4.0K] /data/pocs/9ab3ebc6869c5f8f7ada6be806e74f031e8c4473
├── [3.0K] exploit.py
├── [ 11K] LICENSE
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。