Windows本地提权漏洞(CVE-2021-1732)复现

image

0x00简介

2021年2月10日,微软每月的例行补丁包中修复了一个Windows系统本地提权漏洞,本地攻击者可以利用此漏洞提升到system权限,据称此漏洞被用于定向攻击活动。

0x01漏洞概述

该漏洞由函数win32kfull!xxxCreateWi ndowEx 对应用层回调返回数据校验不严导致,本地用户执行漏洞利用程序获取系统权限。

0x02影响范围

Windows Server, version 20H2 (Server Core Installation)

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for x64-based Systems

Windows Server, version 2004 (Server Core installation)

Windows 10 Version 2004 for x64-based Systems

Windows 10 Version 2004 for ARM64-based Systems

Windows 10 Version 2004 for 32-bit Systems

Windows Server, version 1909 (Server Core installation)

Windows 10 Version 1909 for ARM64-based Systems

Windows 10 Version 1909 for x64-based Systems

Windows 10 Version 1909 for 32-bit Systems

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1803 for ARM64-based Systems

Windows 10 Version 1803 for x64-based Systems

0x03环境搭建

1,首先下载我们本次的复现环境的系统,地址:https://msdn.itellyou.cn/

image

2,然后我们选择windows10的1909版本

image

3,然后我们在虚拟机里面安装这个windows10的版本,这里安装过程我们省略,可以自行百度

image

0x04漏洞复现

1,首先我们下载漏洞复现的exp

地址:https://github.com/shanfenglan/test/blob/master/cve-2021-1732.exe

image

2,创建一个普通用户test

image

3,然后运行exp
cve-2-21-1732.exe "whoami"

image6.png

4,可以运行添加一下用户
cve-2021-1732 "net user a a /add"

image

0x05修复建议

直接更新微软补丁,可通过以下链接获取相关安全补丁:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1732

你可能感兴趣的:(Windows本地提权漏洞(CVE-2021-1732)复现)