CVE-2020-1590 EOP mini writeup So basicly this is just a rerun of the first EOP submission i did where i realised I was doing something novel. CVE-2020-0863-https://twitter.com/buffaloverflow/status/1242497902850854912 …
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Add this Tweet to your website by copying the code below. Learn more
Add this video to your website by copying the code below. Learn more
By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.
| Country | Code | For customers of |
|---|---|---|
| United States | 40404 | (any) |
| Canada | 21212 | (any) |
| United Kingdom | 86444 | Vodafone, Orange, 3, O2 |
| Brazil | 40404 | Nextel, TIM |
| Haiti | 40404 | Digicel, Voila |
| Ireland | 51210 | Vodafone, O2 |
| India | 53000 | Bharti Airtel, Videocon, Reliance |
| Indonesia | 89887 | AXIS, 3, Telkomsel, Indosat, XL Axiata |
| Italy | 4880804 | Wind |
| 3424486444 | Vodafone | |
| » See SMS short codes for other countries | ||
This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.
Hover over the profile pic and click the Following button to unfollow any account.
When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.
The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.
Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.
Get instant insight into what people are talking about now.
Follow more accounts to get instant updates about topics you care about.
See the latest conversations about any topic instantly.
Catch up instantly on the best stories happening as they unfold.
Jonas L Retweeted Rich Warren
CVE-2020-1590 EOP mini writeup So basicly this is just a rerun of the first EOP submission i did where i realised I was doing something novel. CVE-2020-0863-https://twitter.com/buffaloverflow/status/1242497902850854912 …
Jonas L added,

See:
https://itm4n.github.io/cve-2020-0863-windows-diagtrack-info-disclo/ …
https://twitter.com/jonasLyk/status/1240392954507919360 …
Thanks for sharing, both!
pic.twitter.com/D63aoBXdMCDiagnostic tracking service will in SYSTEM security context copy xml files from C:\Users\user\AppData\Local\Packages\http://Microsoft.Windows .ContentDeliveryManager_cw5n1h2txyewy\LocalState\Tips\ to C:\ProgramData\Microsoft\Diagnosis\SoftLandingStage\
back then I redirected the copy source folder to the namedpipe device. Because the named pipe file system allows directory listings it will try and copy a named pipe with .xml extension But named pipes can have ..\ in the name
So when that is used as filename in the copy operation we escape the intended dirs and end up copy my payload into system32.
Jonas L Retweeted Jonas L
Along comes the projected file system- again allowing us to specify invalid filenames in directory listings.https://twitter.com/jonasLyk/status/1265551125593362432 …
Jonas L added,
So, rince and repeat- There is probaly more ways to do this. Like webdav? You can probaly fake such file names easily with that
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.