POC详情: afc88ccc470265aaea777d48eca8fd5786c893f6

来源
关联漏洞
标题: Microsoft Windows Print Spooler Components 安全漏洞 (CVE-2020-1048)
描述:Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler中存在安全漏洞。攻击者可通过登录受影响系统并运行特制的脚本或应用程序利用该漏洞获取提升的权限,执行任意代码。以下产品及版本受到影响:Microsoft Windows 10,Windows 10 1607版本,Windows 10 1709版本,Windows 10 1803版本,Windows
描述
POC exploit code for CVE-2020-1048(PrintDemon)
介绍
# CVE-2020-1048
POC exploit code for CVE-2020-1048(PrintDemon)

## Vulnerable Systems
All Windows version below mentioned in the link are vulnerable: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048
## Steps to reproduce
1) Change the variables `g_PortName` and `g_InputFile` present at the top of `Source.c`.
2) Compile and run using Visual studio.
3) Restart the printer service(spoolsv) or Restart your system.

## Notes
* In case you want to persist the port and printer creation or want the attack to occur after restart of system, you can exit the program using Ctrl^C once the program ask to press Enter.
* `getshell.dll` is included which you can use as a payload to spawn a command prompt as `SYSTEM` privilege.
# Reference
https://windows-internals.com/printdemon-cve-2020-1048/
<br/>
https://github.com/ionescu007/PrintDemon
文件快照

[4.0K] /data/pocs/afc88ccc470265aaea777d48eca8fd5786c893f6 ├── [4.0K] cve-2020-1048 │   ├── [6.9K] cve-2020-1048.vcxproj │   ├── [ 947] cve-2020-1048.vcxproj.filters │   ├── [ 165] cve-2020-1048.vcxproj.user │   └── [7.1K] Source.c ├── [1.4K] cve-2020-1048.sln ├── [ 68K] getshell.dll ├── [ 11K] LICENSE └── [ 868] README.md 1 directory, 8 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。