CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU. PoC: mkdir C:\test Add-PrinterPort -Name c:\test\ualapi.dll New-Item -Type Junction -Path C:\test -Value C:\Windows\System32
-
Show this thread
-
Found a couple weeks ago while re-reading
@aionescu 's article, guessed I was way too late to bother reporting it before today's patch Tuesday, and indeed it's been reported multiple times.2 replies 0 retweets 5 likesShow this thread -
Replying to @clavoillotte @aionescu
And you can exploit with the impersonated device map if they'd got around to shipping some Junction mitigation
2 replies 0 retweets 1 like -
How? It runs as SYSTEM (non impersonated) if I recall correctly
2 replies 0 retweets 0 likes -
When it checks in PortIsValid it impersonates the caller AFAIK. So you can pass it c:\windows\system32\blah.dll but redirect your C: symlink to some random location. When it comes back later at SYSTEM it just writes straight to system32.
3 replies 1 retweet 8 likes -
I guess I’m the only one that used the device map and everyone else just junctionned it?
2 replies 0 retweets 3 likes -
Replying to @aionescu @tiraniddo and
dude- we talked about this :)pic.twitter.com/H0LKSbRpzD
2 replies 0 retweets 1 like -
-
Haha, would have bet Jonas used the device map, his implementation of the technique is
1 reply 0 retweets 0 likes
He is referring to a technique ive developed that duplicates the file structure of c: as obj dirs and sym links pointing to the original files. But only in shadow dirs, so if I wanna make a device map that still allows every file to work except 1 single I can easily do that :)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.