¡¾Îó²îͨ¸æ¡¿ Microsoft Windows PsExec 0dayÎó²î
Ðû²¼Ê±¼ä 2021-01-080x00 Îó²î¸ÅÊö
CVE ID | ʱ ¼ä | 2021-01-08 | |
Àà ÐÍ | LPE | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ·ñ | Ó°Ïì¹æÄ£ | PsExec v1.72-v2.2 |
0x01 Îó²îÏêÇé

PsExecÊÇSysInternalsÌ×¼þµÄÒ»²¿·Ö£¬ËüÊÇϵͳÖÎÀíÔ±µÄÒ»ÖÖ¹¤¾ß£¬¿ÉÔÚÅÌËã»ú¿Í»§¶ËÔ¶³ÌÖ´ÐÐÓ¦ÓóÌÐò¡£
2020Äê12ÔÂ09ÈÕ£¬PsExec±»Åû¶±£´æÒ»¸öÍâµØÈ¨ÏÞÌáÉý0dayÎó²î£¬¸ÃÎó²î±»ÃüÃûΪ¹ÜµÀÐ®ÖÆ£¨»òÃüÃû¹ÜµÀÕ¼Óã©Îó²î£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÓÕʹPsExecÖØÐ·¿ª¶ñÒ⽨ÉèµÄÃüÃû¹ÜµÀ²¢ÊÚÓèÆäÍâµØÏµÍ³È¨ÏÞ¡£ÀÖ³ÉʹÓôËÎó²îºó£¬¹¥»÷Õß½«Äܹ»ÒÔÍâµØÏµÍ³µÄÉí·ÝÖ´ÐÐí§ÒâÀú³Ì£¬´Ó¶ø¿ØÖÆÕû¸öÅÌËã»ú¡£
Ïà¹ØÑо¿Ö°Ô±ÌåÏÖ£¬¸ÃÎó²îÓ°ÏìPsExec°æ±¾´Ó1.72µ½×îа汾2.2£¬ÕâÒâζןÃÎó²îÒѾ±£´æÔ¼Äª14ÄêÁË¡£
Îó²îϸ½Ú
PsExec°üÀ¨Ò»¸öÃûΪ¡°PSEXESVC¡±µÄǶÈëʽ×ÊÔ´£¬ËüÊÇÒ»¸ö¿ÉÖ´ÐеķþÎñ¼¶±ð×é¼þ£¬Ã¿µ±PsExec¿Í»§»úÒÔÔ¶³Ì»úеΪĿµÄÖ´ÐÐPsExecʱ£¬¸Ã×é¼þ¾Í»á×÷ΪSYSTEM±»ÌáÈ¡¡¢¸´ÖƵ½Ô¶³Ì»úеÉϲ¢Ö´ÐС£PsExec¿Í»§¶ËºÍÔ¶³ÌPSEXESVC·þÎñÖ®¼äµÄͨѶͨ¹ýÃüÃû¹ÜµÀ¾ÙÐС£ÏêϸÀ´Ëµ£¬ÃûΪ¡°\PSEXESVC¡±µÄ¹ÜµÀÈÏÕæÆÊÎöºÍÖ´ÐÐPsExec¿Í»§¶ËµÄÏÂÁºÃ±È¡°ÒªÖ´ÐÐÄĸöÓ¦ÓóÌÐò¡±¡¢¡°Ïà¹ØÏÂÁîÐÐÊý¾Ý¡±µÈ¡£
ËäÈ»£¬³öÓÚÇå¾²Ôµ¹ÊÔÓÉ£¬PSEXESVC·þÎñµÄ¡°\PSEXESVC¡±¹ÜµÀÊܵ½±£»¤£¬½öÔÊÐíÖÎÀíÔ±¾ÙÐжÁ/д»á¼û¡£

¿ÉÊÇ£¬Í¨¹ý¹ÜµÀÇÀ×¢£¨¼´Ê×ÏȽ¨Éè¹ÜµÀµÄÒªÁ죩£¬µÍȨÏÞÓ¦ÓóÌÐò¿ÉÒÔ»á¼û¸Ã¹ÜµÀ¡£Ò²¾ÍÊÇ˵£¬ÈôÊÇÍâµØµÍȨÏÞÓ¦ÓóÌÐòÔÚÖ´ÐÐPSEXESVC֮ǰ½¨ÉèÁË¡°\PSEXESVC¡±ÃüÃû¹ÜµÀ£¬ÔòPSEXESVC½«»ñÈ¡ÏÖÓÐʵÀýµÄ¾ä±ú£¬¶ø²»Êǽ¨ÉèÃüÃû¹ÜµÀ£¬Õ⽫±¬·¢Ò»Ð©ÒâÁÏÖ®ÍâµÄЧ¹û£¬ÉԺ󽫿´µ½¡£ÏÂÃæÕ¹Ê¾ÁËPSEXESVCÔõÑù½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄ·´»ã±à£º

ÔÚÕâÀ´ÓnMaxInstances²ÎÊý¿ÉÒÔ¿´µ½£¬ËüÔÊÐí±£´æÎÞÏ޵ġ°\PSEXESVC¡±¹ÜµÀʵÀý¡£±ðµÄ£¬Ëü²¢²»¿ÉÈ·±£ËüÊǵÚÒ»¸ö½¨Éè¡°\PSEXESVC¡±¹ÜµÀµÄÓ¦ÓóÌÐò£¬²¢ÇÒͨ³£Ê¹ÓÃFILE_FLAG_FIRST_PIPE_INSTANCE±ê¼ÇÀ´Íê³É¡£ÔÚÕâÖÖÇéÐÎÏ£¬Ëü½«ÊµÑ齨ÉèÃüÃû¹ÜµÀ£¬ÈôÊÇÃüÃû¹ÜµÀÒѾ±£´æ£¬ÔòÖ»ÐèÔÚŲÓúó»ñÈ¡ÏÖÓС°\PSEXESVC¡±¹ÜµÀµÄ¾ä±ú¼´¿É£¬Õ⽫¼ÌÐøÏÖÓйܵÀµÄACL¡£
ÒÔÏ£¬Í¨¹ýÖÆ×÷ÁËÒ»¸ö¼òÆÓµÄ¡° PipeHijack.exe¡±³ÌÐò£¬¸Ã³ÌÐò½¨ÉèÁË¡°\PSEXESVC¡±¹ÜµÀ£¬¸Ã¹ÜµÀ¾ßÓжԡ° David Wells¡±Óû§µÄ¶Á/д»á¼ûȨÏÞ¡£

ÔËÐкó£¬ÈôÊÇδÀ´ÔÚ±¾»úÊÜÆµØ»òÔ¶³ÌÖ´ÐÐPsExec£¬PSEXESVCʵÀý½«»ñµÃ¹ÜµÀµÄ¾ä±ú£¬²¢¿ÉÒÔ¶ÁÈ¡/дÈë¸Ã¾ä±ú£¬´Ó¶øÔÊÐíµÍȨÏÞÓ¦ÓóÌÐòÓë´ËPSEXESVCϵͳ·þÎñͨѶ¡£

PoCÁ´½Ó£º
https://github.com/tenable/poc/blob/master/Microsoft/Sysinternals/PsExecEscalate.cpp
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ£¬MicrosoftÔÝδÐû²¼´ËÎó²îµÄÇå¾²¸üУ¬µ« 0patchÍŶÓÒѾÐû²¼ÁË´ËÎó²îµÄ΢²¹¶¡¡£
ÏÂÔØÁ´½Ó£º
https://blog.0patch.com/2021/01/local-privilege-escalation-0day-in.html
0x03 ²Î¿¼Á´½Ó
https://www.bleepingcomputer.com/news/security/windows-psexec-zero-day-vulnerability-gets-a-free-micropatch/
https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
0x04 ʱ¼äÏß
2020-12-09 David WellsÅû¶Îó²î
2021-01-07 0patchÍŶÓÐû²¼Î¢²¹¶¡
2021-01-08 VSRCÐû²¼Ç徲ͨ¸æ
0x05 ¸½Â¼
CVSSÆÀ·Ö±ê×¼¹ÙÍø£ºhttp://www.first.org/cvss/



¾©¹«Íø°²±¸11010802024551ºÅ