POC详情: a6d50125007287f9e076f0a449a8ada4fdd797bf

来源
关联漏洞
标题: Microsoft Windows Ancillary Function Driver for WinSock 安全漏洞 (CVE-2023-21768)
描述:Microsoft Windows Ancillary Function Driver for WinSock是美国微软(Microsoft)公司的Winsock 的辅助功能驱动程序。 Microsoft Windows Ancillary Function Driver for WinSock存在安全漏洞。攻击者利用该漏洞可以提升权限。
描述
LPE exploit for CVE-2023-21768
介绍
# CVE-2023-21768 Local Privilege Escalation POC

authors: [chompie](https://twitter.com/chompie1337) & [b33f](https://twitter.com/FuzzySec)

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. 
Write primitive works on all vulnerable systems.

Usage:

```
Windows_AFD_LPE_CVE-2023-21768.exe <pid>
```

where `<pid>` is the process ID (in decimal) of the process to elevate.

Should result in the target process being elevated to SYSTEM


The I/O Ring LPE primitive code is based on the I/ORing R/W [PoC](https://github.com/yardenshafir/IoRingReadWritePrimitive) by [Yarden Shafir](https://twitter.com/yarden_shafir)

Blog post [here](https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/)
文件快照

[4.0K] /data/pocs/a6d50125007287f9e076f0a449a8ada4fdd797bf ├── [ 798] README.md ├── [4.0K] Windows_AFD_LPE_CVE-2023-21768 │   ├── [6.2K] exploit.c │   ├── [2.3K] ioring.h │   ├── [8.0K] ioring_lpe.c │   ├── [7.0K] win_defs.h │   ├── [6.7K] Windows_AFD_LPE_CVE-2023-21768.vcxproj │   └── [1.3K] Windows_AFD_LPE_CVE-2023-21768.vcxproj.filters └── [1.5K] Windows_AFD_LPE_CVE-2023-21768.sln 1 directory, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。