¡¾Îó²îͨ¸æ¡¿ Microsoft Windows PsExec 0dayÎó²î
Ðû²¼Ê±¼ä 2021-01-080x00 Îó²î¸ÅÊö
CVE ID | ʱ ¼ä | 2021-01-08 | |
Àà ÐÍ | LPE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ·ñ | Ó°Ïì¹æÄ£ | PsExec v1.72-v2.2 |
0x01 Îó²îÏêÇé

PsExecÊÇSysInternalsÌ×¼þµÄÒ»²¿·Ö£¬£¬£¬£¬ËüÊÇϵͳÖÎÀíÔ±µÄÒ»ÖÖ¹¤¾ß£¬£¬£¬£¬¿ÉÔÚÅÌËã»ú¿Í»§¶ËÔ¶³ÌÖ´ÐÐÓ¦ÓóÌÐò¡£¡£¡£
2020Äê12ÔÂ09ÈÕ£¬£¬£¬£¬PsExec±»Åû¶±£´æÒ»¸öÍâµØÈ¨ÏÞÌáÉý0dayÎó²î£¬£¬£¬£¬¸ÃÎó²î±»ÃüÃûΪ¹ÜµÀÐ®ÖÆ£¨»òÃüÃû¹ÜµÀÕ¼Óã©Îó²î£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÓÕʹPsExecÖØÐ·¿ª¶ñÒ⽨ÉèµÄÃüÃû¹ÜµÀ²¢ÊÚÓèÆäÍâµØÏµÍ³È¨ÏÞ¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬¹¥»÷Õß½«Äܹ»ÒÔÍâµØÏµÍ³µÄÉí·ÝÖ´ÐÐí§ÒâÀú³Ì£¬£¬£¬£¬´Ó¶ø¿ØÖÆÕû¸öÅÌËã»ú¡£¡£¡£
Ïà¹ØÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìPsExec°æ±¾´Ó1.72µ½×îа汾2.2£¬£¬£¬£¬ÕâÒâζןÃÎó²îÒѾ±£´æÔ¼Äª14ÄêÁË¡£¡£¡£
Îó²îϸ½Ú
PsExec°üÀ¨Ò»¸öÃûΪ¡°PSEXESVC¡±µÄǶÈëʽ×ÊÔ´£¬£¬£¬£¬ËüÊÇÒ»¸ö¿ÉÖ´ÐеÄЧÀͼ¶±ð×é¼þ£¬£¬£¬£¬Ã¿µ±PsExec¿Í»§»úÒÔÔ¶³Ì»úеΪĿµÄÖ´ÐÐPsExecʱ£¬£¬£¬£¬¸Ã×é¼þ¾Í»á×÷ΪSYSTEM±»ÌáÈ¡¡¢¸´ÖƵ½Ô¶³Ì»úеÉϲ¢Ö´ÐС£¡£¡£PsExec¿Í»§¶ËºÍÔ¶³ÌPSEXESVCЧÀÍÖ®¼äµÄͨѶͨ¹ýÃüÃû¹ÜµÀ¾ÙÐС£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬ÃûΪ¡°\PSEXESVC¡±µÄ¹ÜµÀÈÏÕæÆÊÎöºÍÖ´ÐÐPsExec¿Í»§¶ËµÄÏÂÁ£¬£¬£¬ºÃ±È¡°ÒªÖ´ÐÐÄĸöÓ¦ÓóÌÐò¡±¡¢¡°Ïà¹ØÏÂÁîÐÐÊý¾Ý¡±µÈ¡£¡£¡£
ËäÈ»£¬£¬£¬£¬³öÓÚÇå¾²Ôµ¹ÊÔÓÉ£¬£¬£¬£¬PSEXESVCЧÀ͵ġ°\PSEXESVC¡±¹ÜµÀÊܵ½±£»£»£»£»£»¤£¬£¬£¬£¬½öÔÊÐíÖÎÀíÔ±¾ÙÐжÁ/д»á¼û¡£¡£¡£

¿ÉÊÇ£¬£¬£¬£¬Í¨¹ý¹ÜµÀÇÀ×¢£¨¼´Ê×ÏȽ¨Éè¹ÜµÀµÄÒªÁ죩£¬£¬£¬£¬µÍȨÏÞÓ¦ÓóÌÐò¿ÉÒÔ»á¼û¸Ã¹ÜµÀ¡£¡£¡£Ò²¾ÍÊÇ˵£¬£¬£¬£¬ÈôÊÇÍâµØµÍȨÏÞÓ¦ÓóÌÐòÔÚÖ´ÐÐPSEXESVC֮ǰ½¨ÉèÁË¡°\PSEXESVC¡±ÃüÃû¹ÜµÀ£¬£¬£¬£¬ÔòPSEXESVC½«»ñÈ¡ÏÖÓÐʵÀýµÄ¾ä±ú£¬£¬£¬£¬¶ø²»Êǽ¨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬Õ⽫±¬·¢Ò»Ð©ÒâÁÏÖ®ÍâµÄЧ¹û£¬£¬£¬£¬ÉԺ󽫿´µ½¡£¡£¡£ÏÂÃæÕ¹Ê¾ÁËPSEXESVCÔõÑù½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄ·´»ã±à£º

ÔÚÕâÀ£¬£¬£¬´ÓnMaxInstances²ÎÊý¿ÉÒÔ¿´µ½£¬£¬£¬£¬ËüÔÊÐí±£´æÎÞÏ޵ġ°\PSEXESVC¡±¹ÜµÀʵÀý¡£¡£¡£±ðµÄ£¬£¬£¬£¬Ëü²¢²»¿ÉÈ·±£ËüÊǵÚÒ»¸ö½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄÓ¦ÓóÌÐò£¬£¬£¬£¬²¢ÇÒͨ³£Ê¹ÓÃFILE_FLAG_FIRST_PIPE_INSTANCE±ê¼ÇÀ´Íê³É¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬Ëü½«ÊµÑ齨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬ÈôÊÇÃüÃû¹ÜµÀÒѾ±£´æ£¬£¬£¬£¬ÔòÖ»ÐèÔÚŲÓúó»ñÈ¡ÏÖÓС°\PSEXESVC¡±¹ÜµÀµÄ¾ä±ú¼´¿É£¬£¬£¬£¬Õ⽫¼ÌÐøÏÖÓйܵÀµÄACL¡£¡£¡£
ÒÔÏ£¬£¬£¬£¬Í¨¹ýÖÆ×÷ÁËÒ»¸ö¼òÆÓµÄ¡° PipeHijack.exe¡±³ÌÐò£¬£¬£¬£¬¸Ã³ÌÐò½¨ÉèÁË¡°\PSEXESVC¡±¹ÜµÀ£¬£¬£¬£¬¸Ã¹ÜµÀ¾ßÓжԡ° David Wells¡±Óû§µÄ¶Á/д»á¼ûȨÏÞ¡£¡£¡£

ÔËÐк󣬣¬£¬£¬ÈôÊÇδÀ´ÔÚ±¾»úÊÜÆµØ»òÔ¶³ÌÖ´ÐÐPsExec£¬£¬£¬£¬PSEXESVCʵÀý½«»ñµÃ¹ÜµÀµÄ¾ä±ú£¬£¬£¬£¬²¢¿ÉÒÔ¶ÁÈ¡/дÈë¸Ã¾ä±ú£¬£¬£¬£¬´Ó¶øÔÊÐíµÍȨÏÞÓ¦ÓóÌÐòÓë´ËPSEXESVCϵͳЧÀÍͨѶ¡£¡£¡£

PoCÁ´½Ó£º
https://github.com/tenable/poc/blob/master/Microsoft/Sysinternals/PsExecEscalate.cpp
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ£¬£¬£¬£¬MicrosoftÔÝδÐû²¼´ËÎó²îµÄÇå¾²¸üУ¬£¬£¬£¬µ« 0patchÍŶÓÒѾÐû²¼ÁË´ËÎó²îµÄ΢²¹¶¡¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://blog.0patch.com/2021/01/local-privilege-escalation-0day-in.html
0x03 ²Î¿¼Á´½Ó
https://www.bleepingcomputer.com/news/security/windows-psexec-zero-day-vulnerability-gets-a-free-micropatch/
https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
0x04 ʱ¼äÏß
2020-12-09 David WellsÅû¶Îó²î
2021-01-07 0patchÍŶÓÐû²¼Î¢²¹¶¡
2021-01-08 VSRCÐû²¼Ç徲ͨ¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö±ê×¼¹ÙÍø£ºhttp://www.first.org/cvss/



¾©¹«Íø°²±¸11010802024551ºÅ