¡¾Îó²îͨ¸æ¡¿ Microsoft Windows PsExec 0dayÎó²î
Ðû²¼Ê±¼ä 2021-01-080x00 Îó²î¸ÅÊö
CVE ID | ʱ ¼ä | 2021-01-08 | |
Àà ÐÍ | LPE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ·ñ | Ó°Ïì¹æÄ£ | PsExec v1.72-v2.2 |
0x01 Îó²îÏêÇé

PsExecÊÇSysInternalsÌ×¼þµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬ËüÊÇϵͳÖÎÀíÔ±µÄÒ»ÖÖ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÅÌËã»ú¿Í»§¶ËÔ¶³ÌÖ´ÐÐÓ¦ÓóÌÐò¡£¡£¡£
2020Äê12ÔÂ09ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬PsExec±»Åû¶±£´æÒ»¸öÍâµØÈ¨ÏÞÌáÉý0dayÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»ÃüÃûΪ¹ÜµÀÐ®ÖÆ£¨»òÃüÃû¹ÜµÀÕ¼Óã©Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÓÕʹPsExecÖØÐ·¿ª¶ñÒ⽨ÉèµÄÃüÃû¹ÜµÀ²¢ÊÚÓèÆäÍâµØÏµÍ³È¨ÏÞ¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«Äܹ»ÒÔÍâµØÏµÍ³µÄÉí·ÝÖ´ÐÐí§ÒâÀú³Ì£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆÕû¸öÅÌËã»ú¡£¡£¡£
Ïà¹ØÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìPsExec°æ±¾´Ó1.72µ½×îа汾2.2£¬£¬£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²îÒѾ±£´æÔ¼Äª14ÄêÁË¡£¡£¡£
Îó²îϸ½Ú
PsExec°üÀ¨Ò»¸öÃûΪ¡°PSEXESVC¡±µÄǶÈëʽ×ÊÔ´£¬£¬£¬£¬£¬£¬£¬£¬ËüÊÇÒ»¸ö¿ÉÖ´ÐеÄЧÀͼ¶±ð×é¼þ£¬£¬£¬£¬£¬£¬£¬£¬Ã¿µ±PsExec¿Í»§»úÒÔÔ¶³Ì»úеΪĿµÄÖ´ÐÐPsExecʱ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×é¼þ¾Í»á×÷ΪSYSTEM±»ÌáÈ¡¡¢¸´ÖƵ½Ô¶³Ì»úеÉϲ¢Ö´ÐС£¡£¡£PsExec¿Í»§¶ËºÍÔ¶³ÌPSEXESVCЧÀÍÖ®¼äµÄͨѶͨ¹ýÃüÃû¹ÜµÀ¾ÙÐС£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬£¬ÃûΪ¡°\PSEXESVC¡±µÄ¹ÜµÀÈÏÕæÆÊÎöºÍÖ´ÐÐPsExec¿Í»§¶ËµÄÏÂÁ£¬£¬£¬£¬£¬£¬£¬ºÃ±È¡°ÒªÖ´ÐÐÄĸöÓ¦ÓóÌÐò¡±¡¢¡°Ïà¹ØÏÂÁîÐÐÊý¾Ý¡±µÈ¡£¡£¡£
ËäÈ»£¬£¬£¬£¬£¬£¬£¬£¬³öÓÚÇå¾²Ôµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬£¬£¬PSEXESVCЧÀ͵ġ°\PSEXESVC¡±¹ÜµÀÊܵ½±£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬£¬½öÔÊÐíÖÎÀíÔ±¾ÙÐжÁ/д»á¼û¡£¡£¡£

¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¹ÜµÀÇÀ×¢£¨¼´Ê×ÏȽ¨Éè¹ÜµÀµÄÒªÁ죩£¬£¬£¬£¬£¬£¬£¬£¬µÍȨÏÞÓ¦ÓóÌÐò¿ÉÒÔ»á¼û¸Ã¹ÜµÀ¡£¡£¡£Ò²¾ÍÊÇ˵£¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÍâµØµÍȨÏÞÓ¦ÓóÌÐòÔÚÖ´ÐÐPSEXESVC֮ǰ½¨ÉèÁË¡°\PSEXESVC¡±ÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬£¬ÔòPSEXESVC½«»ñÈ¡ÏÖÓÐʵÀýµÄ¾ä±ú£¬£¬£¬£¬£¬£¬£¬£¬¶ø²»Êǽ¨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬£¬Õ⽫±¬·¢Ò»Ð©ÒâÁÏÖ®ÍâµÄЧ¹û£¬£¬£¬£¬£¬£¬£¬£¬ÉԺ󽫿´µ½¡£¡£¡£ÏÂÃæÕ¹Ê¾ÁËPSEXESVCÔõÑù½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄ·´»ã±à£º

ÔÚÕâÀ£¬£¬£¬£¬£¬£¬£¬´ÓnMaxInstances²ÎÊý¿ÉÒÔ¿´µ½£¬£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí±£´æÎÞÏ޵ġ°\PSEXESVC¡±¹ÜµÀʵÀý¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬Ëü²¢²»¿ÉÈ·±£ËüÊǵÚÒ»¸ö½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒͨ³£Ê¹ÓÃFILE_FLAG_FIRST_PIPE_INSTANCE±ê¼ÇÀ´Íê³É¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬£¬Ëü½«ÊµÑ齨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÃüÃû¹ÜµÀÒѾ±£´æ£¬£¬£¬£¬£¬£¬£¬£¬ÔòÖ»ÐèÔÚŲÓúó»ñÈ¡ÏÖÓС°\PSEXESVC¡±¹ÜµÀµÄ¾ä±ú¼´¿É£¬£¬£¬£¬£¬£¬£¬£¬Õ⽫¼ÌÐøÏÖÓйܵÀµÄACL¡£¡£¡£
ÒÔÏ£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÖÆ×÷ÁËÒ»¸ö¼òÆÓµÄ¡° PipeHijack.exe¡±³ÌÐò£¬£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐò½¨ÉèÁË¡°\PSEXESVC¡±¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹ÜµÀ¾ßÓжԡ° David Wells¡±Óû§µÄ¶Á/д»á¼ûȨÏÞ¡£¡£¡£

ÔËÐк󣬣¬£¬£¬£¬£¬£¬£¬ÈôÊÇδÀ´ÔÚ±¾»úÊÜÆµØ»òÔ¶³ÌÖ´ÐÐPsExec£¬£¬£¬£¬£¬£¬£¬£¬PSEXESVCʵÀý½«»ñµÃ¹ÜµÀµÄ¾ä±ú£¬£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÒÔ¶ÁÈ¡/дÈë¸Ã¾ä±ú£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÊÐíµÍȨÏÞÓ¦ÓóÌÐòÓë´ËPSEXESVCϵͳЧÀÍͨѶ¡£¡£¡£

PoCÁ´½Ó£º
https://github.com/tenable/poc/blob/master/Microsoft/Sysinternals/PsExecEscalate.cpp
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬MicrosoftÔÝδÐû²¼´ËÎó²îµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬µ« 0patchÍŶÓÒѾÐû²¼ÁË´ËÎó²îµÄ΢²¹¶¡¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://blog.0patch.com/2021/01/local-privilege-escalation-0day-in.html
0x03 ²Î¿¼Á´½Ó
https://www.bleepingcomputer.com/news/security/windows-psexec-zero-day-vulnerability-gets-a-free-micropatch/
https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
0x04 ʱ¼äÏß
2020-12-09 David WellsÅû¶Îó²î
2021-01-07 0patchÍŶÓÐû²¼Î¢²¹¶¡
2021-01-08 VSRCÐû²¼Ç徲ͨ¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö±ê×¼¹ÙÍø£ºhttp://www.first.org/cvss/



¾©¹«Íø°²±¸11010802024551ºÅ