Exploit for CVE-2020-13162# Pulse Secure Windows Client <9.1.6 (CVE-2020-13162) - exploit
RedTimmy Security 2020 (c) - Twitter: https://twitter.com/redtimmysec <br />
Compile as 32-bit binary if you don't want to die! <br />
Compiled with Visual Studio 2015 - Community Edition <br />
After compiling copy the generated binary into the same folder with "evil.msi" and the Pulse Secure signed binary "PulseSecureInstallerService.exe". Then run it from command line.
For more information about the bug read -> https://www.redtimmy.com/privilege-escalation/pulse-secure-windows-client/ and https://www.redtimmy.com/privilege-escalation/pulse-secure-client-for-windows-9-1-6-toctou-privilege-escalation-cve-2020-13162/
[4.0K] /data/pocs/e8a28fbeaeeae666b12f66b3c810e74c3a2b1610
├── [4.0K] bin
│ ├── [176K] evil.msi
│ ├── [2.1M] PulseSecureInstallerService.exe
│ └── [ 16K] tu-TOCTOU-kaiù-TOCMEU.exe
├── [ 693] README.md
├── [4.0K] tu-TOCTOU-kaiù-TOCMEU
│ ├── [4.9K] FileOpLock.cpp
│ ├── [ 785] FileOpLock.h
│ ├── [ 308] stdafx.cpp
│ ├── [ 384] stdafx.h
│ ├── [ 314] targetver.h
│ ├── [4.3K] tu-TOCTOU-kaiù-TOCMEU.cpp
│ ├── [8.0K] tu-TOCTOU-kaiù-TOCMEU.vcxproj
│ └── [1.5K] tu-TOCTOU-kaiù-TOCMEU.vcxproj.filters
└── [1.3K] tu-TOCTOU-kaiù-TOCMEU.sln
2 directories, 13 files