Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8950 PoC — AMD Radeon User Experience Program Launcher 后置链接漏洞

Source
Associated Vulnerability
Title:AMD Radeon User Experience Program Launcher 后置链接漏洞 (CVE-2020-8950)
Description:AMD Radeon User Experience Program Launcher是美国超微半导体(AMD)公司的一款启动器。 AMD Radeon User Experience Program Launcher 1.0.0.1及之前版本存在后置链接漏洞。攻击者可利用该漏洞提升权限。
Description
CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) 
Readme
# amd_eop_poc (CVE-2020-8950)
AMD User Experience Program Launcher from Radeon Software Privilege Escalation (FileWrite eop) <br>
***Read the note.txt*** 

https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html

https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html

![test1](https://github.com/sailay1996/amd_eop_poc/blob/master/exploit_poc.jpg)

[@404death](https://twitter.com/404death)
File Snapshot

[4.0K] /data/pocs/b78acbc6cf32f31c94ee5f19861e26e9e7992585 ├── [126K] CreateSymlink.exe ├── [ 46] exp.cmd ├── [ 369] exploit.bat ├── [389K] exploit_poc.jpg ├── [ 939] note.txt ├── [ 126] old.cmd ├── [ 391] old_version_amd_exploit.bat ├── [ 456] README.md ├── [145K] UsoDllLoader.exe └── [ 88K] WindowsCoreDeviceInfo.dll 0 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.