Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

windows/local/cve_2020_0787_bits_arbitrary_file_move (and similar) fails due to incorrect revision_number checks #18798

Merged
merged 1 commit into from Feb 12, 2024

Conversation

upsidedwn
Copy link
Contributor

Fixes #18797

Verification

Before the patch:

msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > exploit

[-] Handler failed to bind to 10.148.0.3:40018:-  -
[*] Started reverse TCP handler on 0.0.0.0:40018
[*] Running automatic check ("set AutoCheck false" to disable)
[-] Exploit failed: NoMethodError undefined method `revision_number' for #<Rex::Version "10.0.17763.0">
[*] Exploit completed, but no session was created.

After the patch:

msf6 exploit(windows/local/cve_2020_0787_bits_arbitrary_file_move) > exploit
[-] Handler failed to bind to 10.148.0.3:40018:-  -
[*] Started reverse TCP handler on 0.0.0.0:40018
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The target is not exploitable. The build number of the target machine does not appear to be a vulnerable version! ForceExploit is enabled, proceeding with exploitation.
[*] Step #1: Checking target environment...
[*] Step #2: Generating the malicious DLL...
[*] Payload DLL is 94208 bytes long
[*] Step #3: Loading the exploit DLL to run the main exploit...
[*] Launching netsh to host the DLL...
[-] Operation failed. Trying to inject into the current process...
[*] Reflectively injecting the DLL into 7132...
[*] Sleeping for 20 seconds to allow the exploit to run...
[*] Starting the interactive scan job...
[-] Exploit failed [user-interrupt]: Rex::TimeoutError Send timed out
[-] exploit: Interrupted

@smcintyre-r7 smcintyre-r7 self-assigned this Feb 12, 2024
@smcintyre-r7 smcintyre-r7 added module bug rn-fix release notes fix labels Feb 12, 2024
Copy link
Contributor

@smcintyre-r7 smcintyre-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These changes look good, I was able to reproduce the original issue and validate that the proposed changes fix it. Thank you for submitting this to us.

@smcintyre-r7 smcintyre-r7 merged commit ce04983 into rapid7:master Feb 12, 2024
38 checks passed
@smcintyre-r7
Copy link
Contributor

smcintyre-r7 commented Feb 12, 2024

Release Notes

This fixes an issue in the exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move module's check method that was causing version comparisons to fail.

@upsidedwn upsidedwn deleted the patch-2 branch February 13, 2024 08:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug module rn-fix release notes fix
Projects
Archived in project
2 participants