[ 授权 ] [ 注册 ] [ 恢复账号 ]
联系我们
你可以由此方式联系我们:
0day.today   漏洞利用市场和0day漏洞利用数据库

Windows User Profile Service Privlege Escalation Exploit

[ 0Day-ID-37625 ]
完整标题
Windows User Profile Service Privlege Escalation Exploit [ 置顶 ]
置顶 - 是一项付费服务,可以使你的材料有更多访问者。

价格: 10
添加日期
平台
已确认
价格
免费
风险
[
安全风险级别 - 危急
]
Rel. releases
描述
The user profile service, identified as ProfSrv, is vulnerable to a local privilege elevation vulnerability in its CreateDirectoryJunction() function due to a lack of appropriate checks on the directory structure of the junctions it tries to link together. Attackers can leverage this vulnerability to plant a malicious DLL in a system directory and then trigger a UAC prompt to cause this DLL to be loaded and executed by ProfSrv as the NT AUTHORITY\SYSTEM user. Note that this bug was originally identified as CVE-2021-34484 and was subsequently patched a second time as CVE-2022-21919, however both patches were found to be insufficient. This bug is a patch bypass for CVE-2022-21919 and at the time of publishing, has not yet been patched, though plans are in place to patch it as CVE-2022-26904.
CVE
CVE-2021-34484
CVE-2022-21919
CVE-2022-26904
其他信息
投诉
0
评论
0
视角
9 440
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
免费
开放此漏洞利用
你可以免费开放此漏洞利用的代码
开放此漏洞利用
开放此漏洞利用
你可以免费开放此漏洞利用的代码
已经0day.today 漏洞数据库 : 漏洞 : 0day : 最新漏洞利用 : 购买出售私有漏洞利用 : Inj3ct0r团队的shellcode站管理员确认
已经0day.today 漏洞数据库 : 漏洞 : 0day : 最新漏洞利用 : 购买出售私有漏洞利用 : Inj3ct0r团队的shellcode站管理员确认
此材料已经管理员查验,并证明绝对有效。
作者
BL
29
漏洞利用
1626
读者
57
[ 评论: 0 ]
评论须知:
  • 用户不得在此交换个人联系方式
  • 禁止在此谈论其它网站/项目的交易价格
  • 禁止转售
违规者将被屏蔽账户并没收金币。

登录或注册后即可发表评论