Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7283 PoC — McAfee Total Protection 安全漏洞

Source
Associated Vulnerability
Title:McAfee Total Protection 安全漏洞 (CVE-2020-7283)
Description:McAfee Total Protection(MTP)是美国迈克菲(McAfee)公司的一套防病毒软件。 McAfee MTP 16.0.R26之前版本中存在安全漏洞。本地攻击者可借助恶意脚本或程序利用该漏洞在原本无法访问的位置中创建和编辑文件。
Readme
# CVE-2020-7283 Exploit

The write up can be found in the blog of the RedyOps Labs: 

https://labs.redyops.com/index.php/2020/07/14/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283/

### Third Party Tools
This exploit code, is heavily based on symboliclink-testing-tools which was Developed by James Forshaw. The symboliclink-testing-tools can be found here:

https://github.com/googleprojectzero/symboliclink-testing-tools
File Snapshot

[4.0K] /data/pocs/ad66ba295f906fc9aea1798f2db7e2fc085ef972 ├── [ 11M] PoC.mkv ├── [ 450] README.md └── [4.0K] src ├── [4.0K] CommonUtils │   ├── [3.7K] CommonUtils.cpp │   ├── [1.0K] CommonUtils.h │   ├── [4.8K] CommonUtils.vcxproj │   ├── [2.7K] CommonUtils.vcxproj.filters │   ├── [2.0K] DirectoryObject.cpp │   ├── [4.5K] FileOpLock.cpp │   ├── [ 789] FileOpLock.h │   ├── [5.0K] FileSymlink.cpp │   ├── [ 588] FileSymlink.h │   ├── [1.6K] Hardlink.cpp │   ├── [2.0K] NativeSymlink.cpp │   ├── [2.2K] ntimports.h │   ├── [5.2K] RegistrySymlink.cpp │   ├── [ 13K] ReparsePoint.cpp │   ├── [1.2K] ReparsePoint.h │   ├── [1.8K] ScopedHandle.cpp │   ├── [ 498] ScopedHandle.h │   ├── [ 298] stdafx.cpp │   ├── [ 270] stdafx.h │   ├── [ 314] targetver.h │   └── [1.3K] typed_buffer.h ├── [4.0K] Exploit │   ├── [2.4K] Exploit.cpp │   ├── [1.2K] Exploit.filters │   ├── [5.0K] Exploit.vcxproj │   ├── [ 300] stdafx.cpp │   ├── [ 462] stdafx.h │   └── [ 314] targetver.h └── [1.5K] McAfee Total Protection 16.0 R23.sln 3 directories, 30 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.