¡¾Îó²îͨ¸æ¡¿ Microsoft Windows PsExec 0dayÎó²î
Ðû²¼Ê±¼ä 2021-01-080x00 Îó²î¸ÅÊö
CVE ID | ʱ ¼ä | 2021-01-08 | |
Àà ÐÍ | LPE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ·ñ | Ó°Ïì¹æÄ£ | PsExec v1.72-v2.2 |
0x01 Îó²îÏêÇé
PsExecÊÇSysInternalsÌ×¼þµÄÒ»²¿·Ö£¬£¬£¬£¬£¬£¬£¬ËüÊÇϵͳÖÎÀíÔ±µÄÒ»ÖÖ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬¿ÉÔÚÅÌËã»ú¿Í»§¶ËÔ¶³ÌÖ´ÐÐÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¡£
2020Äê12ÔÂ09ÈÕ£¬£¬£¬£¬£¬£¬£¬PsExec±»Åû¶±£´æÒ»¸öÍâµØÈ¨ÏÞÌáÉý0dayÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»ÃüÃûΪ¹ÜµÀÐ®ÖÆ£¨»òÃüÃû¹ÜµÀÕ¼Óã©Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÓÕʹPsExecÖØÐ·¿ª¶ñÒ⽨ÉèµÄÃüÃû¹ÜµÀ²¢ÊÚÓèÆäÍâµØÏµÍ³È¨ÏÞ¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«Äܹ»ÒÔÍâµØÏµÍ³µÄÉí·ÝÖ´ÐÐí§ÒâÀú³Ì£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆÕû¸öÅÌËã»ú¡£¡£¡£¡£¡£¡£¡£
Ïà¹ØÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìPsExec°æ±¾´Ó1.72µ½×îа汾2.2£¬£¬£¬£¬£¬£¬£¬ÕâÒâζןÃÎó²îÒѾ±£´æÔ¼Äª14ÄêÁË¡£¡£¡£¡£¡£¡£¡£
Îó²îϸ½Ú
PsExec°üÀ¨Ò»¸öÃûΪ¡°PSEXESVC¡±µÄǶÈëʽ×ÊÔ´£¬£¬£¬£¬£¬£¬£¬ËüÊÇÒ»¸ö¿ÉÖ´ÐеÄЧÀͼ¶±ð×é¼þ£¬£¬£¬£¬£¬£¬£¬Ã¿µ±PsExec¿Í»§»úÒÔÔ¶³Ì»úеΪĿµÄÖ´ÐÐPsExecʱ£¬£¬£¬£¬£¬£¬£¬¸Ã×é¼þ¾Í»á×÷ΪSYSTEM±»ÌáÈ¡¡¢¸´ÖƵ½Ô¶³Ì»úеÉϲ¢Ö´ÐС£¡£¡£¡£¡£¡£¡£PsExec¿Í»§¶ËºÍÔ¶³ÌPSEXESVCЧÀÍÖ®¼äµÄͨѶͨ¹ýÃüÃû¹ÜµÀ¾ÙÐС£¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬ÃûΪ¡°\PSEXESVC¡±µÄ¹ÜµÀÈÏÕæÆÊÎöºÍÖ´ÐÐPsExec¿Í»§¶ËµÄÏÂÁ£¬£¬£¬£¬£¬£¬ºÃ±È¡°ÒªÖ´ÐÐÄĸöÓ¦ÓóÌÐò¡±¡¢¡°Ïà¹ØÏÂÁîÐÐÊý¾Ý¡±µÈ¡£¡£¡£¡£¡£¡£¡£
ËäÈ»£¬£¬£¬£¬£¬£¬£¬³öÓÚÇå¾²Ôµ¹ÊÔÓÉ£¬£¬£¬£¬£¬£¬£¬PSEXESVCЧÀ͵ġ°\PSEXESVC¡±¹ÜµÀÊܵ½±£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬½öÔÊÐíÖÎÀíÔ±¾ÙÐжÁ/д»á¼û¡£¡£¡£¡£¡£¡£¡£
¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¹ÜµÀÇÀ×¢£¨¼´Ê×ÏȽ¨Éè¹ÜµÀµÄÒªÁ죩£¬£¬£¬£¬£¬£¬£¬µÍȨÏÞÓ¦ÓóÌÐò¿ÉÒÔ»á¼û¸Ã¹ÜµÀ¡£¡£¡£¡£¡£¡£¡£Ò²¾ÍÊÇ˵£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÍâµØµÍȨÏÞÓ¦ÓóÌÐòÔÚÖ´ÐÐPSEXESVC֮ǰ½¨ÉèÁË¡°\PSEXESVC¡±ÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬ÔòPSEXESVC½«»ñÈ¡ÏÖÓÐʵÀýµÄ¾ä±ú£¬£¬£¬£¬£¬£¬£¬¶ø²»Êǽ¨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬Õ⽫±¬·¢Ò»Ð©ÒâÁÏÖ®ÍâµÄЧ¹û£¬£¬£¬£¬£¬£¬£¬ÉԺ󽫿´µ½¡£¡£¡£¡£¡£¡£¡£ÏÂÃæÕ¹Ê¾ÁËPSEXESVCÔõÑù½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄ·´»ã±à£º
ÔÚÕâÀ£¬£¬£¬£¬£¬£¬´ÓnMaxInstances²ÎÊý¿ÉÒÔ¿´µ½£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí±£´æÎÞÏ޵ġ°\PSEXESVC¡±¹ÜµÀʵÀý¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Ëü²¢²»¿ÉÈ·±£ËüÊǵÚÒ»¸ö½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬²¢ÇÒͨ³£Ê¹ÓÃFILE_FLAG_FIRST_PIPE_INSTANCE±ê¼ÇÀ´Íê³É¡£¡£¡£¡£¡£¡£¡£ÔÚÕâÖÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬Ëü½«ÊµÑ齨ÉèÃüÃû¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬ÈôÊÇÃüÃû¹ÜµÀÒѾ±£´æ£¬£¬£¬£¬£¬£¬£¬ÔòÖ»ÐèÔÚŲÓúó»ñÈ¡ÏÖÓС°\PSEXESVC¡±¹ÜµÀµÄ¾ä±ú¼´¿É£¬£¬£¬£¬£¬£¬£¬Õ⽫¼ÌÐøÏÖÓйܵÀµÄACL¡£¡£¡£¡£¡£¡£¡£
ÒÔÏ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÖÆ×÷ÁËÒ»¸ö¼òÆÓµÄ¡° PipeHijack.exe¡±³ÌÐò£¬£¬£¬£¬£¬£¬£¬¸Ã³ÌÐò½¨ÉèÁË¡°\PSEXESVC¡±¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬¸Ã¹ÜµÀ¾ßÓжԡ° David Wells¡±Óû§µÄ¶Á/д»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£
ÔËÐк󣬣¬£¬£¬£¬£¬£¬ÈôÊÇδÀ´ÔÚ±¾»úÊÜÆµØ»òÔ¶³ÌÖ´ÐÐPsExec£¬£¬£¬£¬£¬£¬£¬PSEXESVCʵÀý½«»ñµÃ¹ÜµÀµÄ¾ä±ú£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÒÔ¶ÁÈ¡/дÈë¸Ã¾ä±ú£¬£¬£¬£¬£¬£¬£¬´Ó¶øÔÊÐíµÍȨÏÞÓ¦ÓóÌÐòÓë´ËPSEXESVCϵͳЧÀÍͨѶ¡£¡£¡£¡£¡£¡£¡£
PoCÁ´½Ó£º
https://github.com/tenable/poc/blob/master/Microsoft/Sysinternals/PsExecEscalate.cpp
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬MicrosoftÔÝδÐû²¼´ËÎó²îµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬µ« 0patchÍŶÓÒѾÐû²¼ÁË´ËÎó²îµÄ΢²¹¶¡¡£¡£¡£¡£¡£¡£¡£
ÏÂÔØÁ´½Ó£º
https://blog.0patch.com/2021/01/local-privilege-escalation-0day-in.html
0x03 ²Î¿¼Á´½Ó
https://www.bleepingcomputer.com/news/security/windows-psexec-zero-day-vulnerability-gets-a-free-micropatch/
https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
0x04 ʱ¼äÏß
2020-12-09 David WellsÅû¶Îó²î
2021-01-07 0patchÍŶÓÐû²¼Î¢²¹¶¡
2021-01-08 VSRCÐû²¼Ç徲ͨ¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö±ê×¼¹ÙÍø£ºhttp://www.first.org/cvss/