Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1422 PoC — Microsoft Windows和Microsoft Windows Server 后置链接漏洞

Source
Associated Vulnerability
Title:Microsoft Windows和Microsoft Windows Server 后置链接漏洞 (CVE-2019-1422)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Windows Server中iphlpsvc.dll处理文件创建的方式存在提权漏洞。攻击者可借助特制的应用程序利用该漏洞以提升的权限执行代码。以下产品及版本受到影响:Microsoft Windows 10
Readme
# cve-2019-1422
鸡肋漏洞一枚,辣鸡。  
重新测试手工删除c:\windows\temp目录下的teredo.txt或者iphttps.txt
File Snapshot

[4.0K] /data/pocs/cbe0062516fb0f57dd67bc04e4730f5d6a4a1e93 ├── [4.0K] cve-2019-1422 │   ├── [3.5K] CommonUtils.cpp │   ├── [ 658] CommonUtils.h │   ├── [2.6K] cve-2019-1422.cpp │   ├── [8.0K] cve-2019-1422.vcxproj │   ├── [1.6K] cve-2019-1422.vcxproj.filters │   ├── [ 162] cve-2019-1422.vcxproj.user │   ├── [2.2K] ntimports.h │   ├── [ 293] stdafx.cpp │   ├── [ 301] stdafx.h │   ├── [ 306] targetver.h │   ├── [1.3K] typed_buffer.h │   └── [4.0K] x64 │   └── [4.0K] Release │   ├── [950K] CommonUtils.obj │   ├── [1.2K] CVE_2019-1422.Build.CppClean.log │   ├── [1.3K] cve-2019-1422.log │   ├── [867K] cve-2019-1422.obj │   ├── [4.0K] cve-2019-1422.tlog │   │   ├── [1.4K] CL.command.1.tlog │   │   ├── [ 81K] CL.read.1.tlog │   │   ├── [1.3K] CL.write.1.tlog │   │   ├── [ 209] cve-2019-1422.lastbuildstate │   │   ├── [ 422] cve-2019-1422.write.1u.tlog │   │   ├── [1.6K] link.command.1.tlog │   │   ├── [4.4K] link.read.1.tlog │   │   └── [ 590] link.write.1.tlog │   └── [420K] vc141.pdb ├── [1.7K] cve-2019-1422.sln ├── [ 128] README.md └── [4.0K] x64 └── [4.0K] Release └── [252K] CVE_2019-1422.exe 6 directories, 27 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.