zoukankan      html  css  js  c++  java
  • CVE-2020-0674 IE远程代码执行漏洞

    0x00 漏洞描述

      该漏洞影响组件为jscript.dll,该动态链接库是微软Internet Explorer浏览器的Javascript引擎之一,其中IE8及以下使用jscript.dll,IE9及以上默认使用jscript9.dll,但网页可以通过《script》标签指定在IE8兼容性模式下加载jscript.dll,因此IE9、IE10、IE11都受到此漏洞影响。
      从操作系统范围来看,本漏洞影响范围横跨Windows 7至Windows 10中所有的个人操作系统和服务器操作系统。
      该漏洞是一个Use-After-Free漏洞,攻击样本使用UAF达成类型混淆,进而获取全局内存读写能力并绕过ASLR等漏洞利用缓解技术,并从指定ip地址请求下一步攻击载荷,最终达到远程代码执行。

    0x01 影响版本

    产品平台
    Internet Explorer 10 Windows Server 2012
    Internet Explorer 11 Windows 10 Version 1803 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1803 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1803 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1809 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1809 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1809 for ARM64-based Systems
    Internet Explorer 11 Windows Server 2019
    Internet Explorer 11 Windows 10 Version 1909 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1909 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1909 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1709 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1709 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1709 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1903 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1903 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1903 for ARM64-based Systems
    Internet Explorer 11 Windows 10 for 32-bit Systems
    Internet Explorer 11 Windows 10 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1607 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1607 for x64-based Systems
    Internet Explorer 11 Windows Server 2016
    Internet Explorer 11 Windows 7 for 32-bit Systems Service Pack 1
    Internet Explorer 11 Windows 7 for x64-based Systems Service Pack 1
    Internet Explorer 11 Windows 8.1 for 32-bit systems
    Internet Explorer 11 Windows 8.1 for x64-based systems
    Internet Explorer 11 Windows RT 8.1
    Internet Explorer 11 Windows Server 2008 R2 for x64-based Systems Service Pack 1
    Internet Explorer 11 Windows Server 2012
    Internet Explorer 11 Windows Server 2012 R2
    Internet Explorer 9 Windows Server 2008 for 32-bit Systems Service Pack 2
    Internet Explorer 9 Windows Server 2008 for x64-based Systems Service Pack 2

    0x02 漏洞复现

    IE版本:11.900.18362.0

    python:python 3.8

    操作系统:windows 10 专业工作站版

    0x03 编写脚本

    1.编写html CVE-2020-0674.html

    <head>
     
    <meta http-equiv="X-UA-Compatible" content="IE=11"></meta>
     
    <script language="Jscript.Encode">
     
    document.write("jscript.dll says hello.");</script>
    

    2.编写py脚本 CVE-2020-0674.py

    from selenium import webdriver
    ieDriver = "C:Program Files (x86)Internet ExplorerIEDriverServer.exe" 
    browser = webdriver.Ie(ieDriver)
    browser.get('file:///D:My_hacker_tool kilcve-jianceCVE-2020-0674cve-2020-0674.html')   '''这里路径是存放html的路径'''
    

    0x04 复现成功

    0x05 修复意见

    32位系统

    takeown /f %windir%system32jscript.dll
    
    cacls %windir%system32jscript.dll /E /P everyone:N

    64位系统

    takeown /f %windir%syswow64jscript.dll
    
    cacls %windir%syswow64jscript.dll /E /P everyone:N
    
    takeown /f %windir%system32jscript.dll
    
    cacls %windir%system32jscript.dll /E /P everyone:N
    

      


     

  • 相关阅读:
    innodb_fast_shutdown中值为1或者2的区别是?
    C语言解析日志,存储数据到伯克利DB 2
    (2010-8-31) awk内存泄漏以及缓慢的正则表达式计算速度
    C语言解析日志,存储数据到伯克利DB
    awk的接口实现方案1
    谷歌开源Gumbo:纯C语言实现的HTML5解析库
    pylint
    提高写代码的能力(转载)
    python的闭包以及闭包在设计里的意图和作用
    痛并快乐的造轮子之旅:awk访问数据库之旅
  • 原文地址:https://www.cnblogs.com/bflw/p/13297970.html
Copyright © 2011-2022 走看看