Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-41772 PoC — Microsoft Win32K 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Win32K 安全漏洞 (CVE-2023-41772)
Description:Microsoft Win32k是美国微软(Microsoft)公司的一个用于Windows多用户管理的系统文件。 Microsoft Win32K存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Se
Readme
# CVE-2023-41772 / UIFuckUp

UIFuckUp exploit to gain system privileges as user on Windows 10 (1809 and up) and 11.

How To:
1. Compile uiaccess_exploit.exe and uiaccess_exploit.dll
2. Create directory C:\exploit
3. Place uiaccess_exploit.exe, uiaccess_exploit.dll and JuciyPotatoNG.exe in C:\exploit
4. Run C:\Exploit\uiaccess_exploit.exe as a non-admin user
5. Wait for a command prompt running as system

Reference: https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-41772
File Snapshot

[4.0K] /data/pocs/b4b7a25176f3bbfcb226a831fe344893529931b9 ├── [ 410] exploit_cleanup.bat ├── [ 81] Needs_JuicyPotatoNG.txt ├── [ 489] README.md ├── [ 12K] uiaccess_exploit.c ├── [4.0K] uiaccess_exploit_dll │   ├── [1.5K] uiaccess_exploit_dll.c │   ├── [8.2K] uiaccess_exploit_dll.vcxproj │   └── [1.1K] uiaccess_exploit_dll.vcxproj.filters ├── [2.2K] uiaccess_exploit.sln ├── [7.0K] uiaccess_exploit.vcxproj └── [ 966] uiaccess_exploit.vcxproj.filters 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.