Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK.# CVE-2024-0197-POC
Proof of concept for Local Privilege Escalation in Thales Sentinel HASP LDK.
I initially wanted to develop one, but eventually that turned out to be unnecessary.
There is no race condition to win, and a simple DLL search order hijacking from a known location suffices to attain SYSTEM.
We simply:
1. compile raw.cpp as fltlib.dll and put it into AppData\Local\Temp (it has to be a proper proxy DLL leading to C:\Windows\System32\fltlib.dll).
2. then just run msiexec.exe /fa PATH_TO_MSI.
[4.0K] /data/pocs/d25e4f09eca790382e6f9640992207a9454f48ee
├── [161K] DLL_hijacking.png
├── [283K] GOT_SYSTEM1.PNG
├── [ 11K] installer_in_dir.PNG
├── [5.0K] raw.cpp
├── [ 509] README.md
└── [192K] vulnerable_process_creation.png
0 directories, 6 files