Skip to content

Commit 18c63df

Browse files
committed
MS13-005
1 parent 8740f68 commit 18c63df

File tree

2 files changed

+1039
-0
lines changed

2 files changed

+1039
-0
lines changed

MS13-005/README.md

+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
# MS13-005
2+
3+
```
4+
Due to a problem with isolating window broadcast messages in the Windows kernel,
5+
an attacker can broadcast commands from a lower Integrity Level process to a higher Integrity Level process,
6+
thereby effecting a privilege escalation.
7+
This issue affects Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, and RT.
8+
Note that spawning a command prompt with the shortcut key combination Win+Shift+# does not work in Vista,
9+
so the attacker will have to check if the user is already running a command prompt and set SPAWN_PROMPT false.
10+
Three exploit techniques are available with this module.
11+
The WEB technique will execute a powershell encoded payload from a Web location.
12+
The FILE technique will drop an executable to the file system,
13+
set it to medium integrity and execute it.
14+
The TYPE technique will attempt to execute a powershell encoded payload directly from the command line,
15+
but may take some time to complete.
16+
```
17+
- The exp was from [@0vercl0k](https://github.com/0vercl0k/stuffz/blob/master/ms13-005-funz-poc.cpp)
18+
19+
Vulnerability reference:
20+
* [MS13-005](https://technet.microsoft.com/library/security/ms13-005)
21+
* [CVE-2013-0008](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0008)
22+
23+
24+
## load the module within the msf
25+
- [msf](https://www.rapid7.com/db/modules/exploit/windows/local/ms13_005_hwnd_broadcast)
26+
```
27+
msf > use exploit/windows/local/ms13_005_hwnd_broadcast
28+
msf exploit(ms13_005_hwnd_broadcast) > show targets
29+
...targets...
30+
msf exploit(ms13_005_hwnd_broadcast) > set TARGET <target-id>
31+
msf exploit(ms13_005_hwnd_broadcast) > show options
32+
...show and set options...
33+
msf exploit(ms13_005_hwnd_broadcast) > exploit
34+
```
35+
36+
## Links
37+
38+
- [HWND_BROADCAST](http://blog.cmpxchg8b.com/2013/02/a-few-years-ago-while-working-on.html)

0 commit comments

Comments
 (0)