Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0674 PoC — Microsoft Internet Explorer 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Internet Explorer 资源管理错误漏洞 (CVE-2020-0674)
Description:Microsoft Internet Explorer(IE)是美国微软(Microsoft)公司的一款Windows操作系统附带的Web浏览器。 Microsoft IE 9、10和11中脚本引擎处理内存对象的方法存在资源管理错误漏洞。攻击者可利用该漏洞在当前用户的上下文中执行任意代码,损坏内存。以下产品及版本受到影响: Internet Explorer 10版本, Internet Explorer 9版本, Internet Explorer 11版本。
Description
Info about CVE-2020-0674
Readme
## Test Internet Explorer on CVE-2020-0674

If you can see the text: `jscript.dll says hello` on this page:
https://binaryfigments.github.io/CVE-2020-0674/

Then you can be vulnerable the this attack. You will see the following screen.

![jscript.png](https://raw.githubusercontent.com/binaryfigments/CVE-2020-0674/master/jscript.png "jscript.dll")

Mitigation steps from [Microsoft's advisory](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001)

For 32-bit systems, enter the following command at an administrative command prompt:

```shell
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
```

For 64-bit systems, enter the following command at an administrative command prompt:

```shell
takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
```

### Links

* https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001
* https://www.kryptoslogic.com/blog/2020/01/rdp-to-rce-when-fragmentation-goes-wrong/ 
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0674 
* https://techcrunch.com/2020/01/18/internet-explorer-security-flaw/ 
* https://kb.cert.org/vuls/id/338824/ 
* https://www.us-cert.gov/ncas/current-activity/2020/01/17/microsoft-releases-security-advisory-internet-explorer 
* https://securityaffairs.co/wordpress/96560/hacking/cve-2020-0674-ie-0day.html 
* https://www.ncsc.nl/actueel/advisory?id=NCSC-2020-0056 
File Snapshot

[4.0K] /data/pocs/f29d75e300af85c27e8eb83f31d47a0b9894e64f ├── [4.0K] docs │   ├── [ 160] index.html │   └── [ 14K] jscript.png ├── [ 14K] jscript.png ├── [1.0K] LICENSE └── [1.5K] README.md 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.