mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-09 14:27:36 +08:00
7f075b99f4
Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com>
111 lines
3.1 KiB
Markdown
111 lines
3.1 KiB
Markdown
## CVE-2021-1675 Windows Print Spooler远程代码执行漏洞
|
|
|
|
### 简介
|
|
|
|
Windows Print Spooler是Windows的打印机后台处理程序,广泛的应用于各种内网中。
|
|
|
|
2021年6月,Windows官方发布安全更新,其中修复了 CVE-2021-1675 Windows Print Spooler远程代码执行漏洞。
|
|
|
|
2021年6月29日,安全研究人员在GitHub上公开了Windows Print Spooler远程代码执行漏洞POC。攻击者可以通过该漏洞绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序,若攻击者所控制的用户在域中,则攻击者可以连接到DC中的Spooler服务,并利用该漏洞在DC中安装恶意的驱动程序,完整的控制整个域环境。
|
|
|
|
|
|
|
|
### 影响版本
|
|
|
|
> Windows Server 2019 (Server Core installation)
|
|
>
|
|
> Windows Server 2019
|
|
>
|
|
> Windows Server 2016 (Server Core installation)
|
|
>
|
|
> Windows Server 2016
|
|
>
|
|
> Windows Server 2012 R2 (Server Core installation)
|
|
>
|
|
> Windows Server 2012 R2
|
|
>
|
|
> Windows Server 2012 (Server Core installation)
|
|
>
|
|
> Windows Server 2012
|
|
>
|
|
> Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
|
|
>
|
|
> Windows Server 2008 R2 for x64-based Systems Service Pack 1
|
|
>
|
|
> Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
|
|
>
|
|
> Windows Server 2008 for x64-based Systems Service Pack 2
|
|
>
|
|
> Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
|
|
>
|
|
> Windows Server 2008 for 32-bit Systems Service Pack 2
|
|
>
|
|
> Windows Server, version 2004 (Server Core installation)
|
|
>
|
|
> Windows RT 8.1
|
|
>
|
|
> Windows 8.1 for x64-based systems
|
|
>
|
|
> Windows 8.1 for 32-bit systems
|
|
>
|
|
> Windows 7 for x64-based Systems Service Pack 1
|
|
>
|
|
> Windows 7 for 32-bit Systems Service Pack 1
|
|
>
|
|
> Windows 10 Version 1607 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 1607 for 32-bit Systems
|
|
>
|
|
> Windows 10 for x64-based Systems
|
|
>
|
|
> Windows 10 for 32-bit Systems
|
|
>
|
|
> Windows Server, version 20H2 (Server Core Installation)
|
|
>
|
|
> Windows 10 Version 20H2 for ARM64-based Systems
|
|
>
|
|
> Windows 10 Version 20H2 for 32-bit Systems
|
|
>
|
|
> Windows 10 Version 20H2 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 2004 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 2004 for ARM64-based Systems
|
|
>
|
|
> Windows 10 Version 2004 for 32-bit Systems
|
|
>
|
|
> Windows 10 Version 21H1 for 32-bit Systems
|
|
>
|
|
> Windows 10 Version 21H1 for ARM64-based Systems
|
|
>
|
|
> Windows 10 Version 21H1 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 1909 for ARM64-based Systems
|
|
>
|
|
> Windows 10 Version 1909 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 1909 for 32-bit Systems
|
|
>
|
|
> Windows 10 Version 1809 for ARM64-based Systems
|
|
>
|
|
> Windows 10 Version 1809 for x64-based Systems
|
|
>
|
|
> Windows 10 Version 1809 for 32-bit Systems
|
|
|
|
### 处置建议
|
|
|
|
1、及时更新Windows安全补丁,可登录阿里云云安全中心使用漏洞修复模块进行一键检测与修复。
|
|
|
|
2、在服务应用(services.msc)中禁用 Print Spooler服务。
|
|
|
|
### 相关链接
|
|
|
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675
|
|
|
|
### POC 链接
|
|
|
|
https://github.com/afwu/PrintNightmare
|
|
|
|
https://github.com/cube0x0/CVE-2021-1675
|
|
|