Open h00die opened 1 year ago
Been taking a look into this but haven't managed to get the POC to run successfully on a target yet. If someone has instructions on how to get the PoC working though I'd be open to hearing what needs to be adjusted. Atm its a little confusing.
Well found out why its likely failing compiling. Author decided to use hardcoded offsets into USER32.dll and then didn't tell people which OS its meant to be running on 🙄 Guessing the reason its crashing for me is that offset from the start of IsMenu is incorrect for my OS.
EDIT: Upon further investigation there were two PoCs both of which contain similar code but with slight differences. Switching back over to https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-29336/poc.cpp shows that the PoC is meant to work on Windows Server 2016 Dataserver with May patches installed, I presume meaning that May 2023 patches should be installed on the target. However May 2023 patches are also the ones meant to fix this vulnerability so now I'm not sure. At the very least I know Windows Server 2016 Dataserver should be used though.
@numencyber any insight on what OS the PoC is supposed to work against? Not asking you to defend your code or anything like that, just hoping to help shed some light on how we could get this in metasploit
Taking a closer look at the demo video they appear to be running it on Windows Server 2016 Datacenter Evaluation with build 14393.rs1_release.230329-2152. They also show the language is en-us so I don't think that would make a difference like I thought it might, and that the following hotpatch fixes are installed:
Looks like a fresh evaluation install gives me Build 14393.rs1_release.161220-1747, which is from 2017/01/11, and the version that was tested is from 2023/04/12 aka just before the May Update.
Okay after installing the updates, got the same build release number so going to take a snapshot and see if I can get the PoC working.
After installing the same build snapshot I can now build the exploit but getting BSODs with SYSTEM SERVICE EXCEPTION inside win32kfull.sys when running the exploit using the release and debug compiled versions of the code.
Okay I think I should have something for this shortly, going to upload the code I have and then link it here in case we need a backup.
Here is the list of improvements I made:
Summary
Windows priv esc for 10+ and 2008+ on the server side
Basic example
https://github.com/numencyber/Vulnerability_PoC/blob/main/CVE-2023-29336/poc.cpp
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
Motivation
the more windows priv esc the better!