Skip to content

Commit 0ac48ea

Browse files
committed
automatic module_metadata_base.json update
1 parent b69db83 commit 0ac48ea

File tree

1 file changed

+68
-64
lines changed

1 file changed

+68
-64
lines changed

db/modules_metadata_base.json

Lines changed: 68 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -148224,35 +148224,25 @@
148224148224
],
148225148225
"needs_cleanup": true
148226148226
},
148227-
"exploit_windows/local/cve_2021_1732_win32k": {
148228-
"name": "Win32k ConsoleControl Offset Confusion",
148229-
"fullname": "exploit/windows/local/cve_2021_1732_win32k",
148227+
"exploit_windows/local/cve_2021_21551_dbutil_memmove": {
148228+
"name": "Dell DBUtil_2_3.sys IOCTL memmove",
148229+
"fullname": "exploit/windows/local/cve_2021_21551_dbutil_memmove",
148230148230
"aliases": [
148231148231

148232148232
],
148233148233
"rank": 400,
148234-
"disclosure_date": "2021-02-10",
148234+
"disclosure_date": "2021-05-04",
148235148235
"type": "exploit",
148236148236
"author": [
148237-
"BITTER APT",
148238-
"JinQuan",
148239-
"MaDongZe",
148240-
"TuXiaoYi",
148241-
"LiHao",
148242-
"KaLendsi",
148237+
"Kasif Dekel",
148238+
"SentinelLabs",
148243148239
"Spencer McIntyre"
148244148240
],
148245-
"description": "A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of\n NT AUTHORITY\\SYSTEM. The flaw exists in how the WndExtra field of a window can be manipulated into being\n treated as an offset despite being populated by an attacker-controlled value. This can be leveraged to\n achieve an out of bounds write operation, eventually leading to privilege escalation.",
148241+
"description": "The DBUtil_2_3.sys driver distributed by Dell exposes an unprotected IOCTL interface that can be abused by\n an attacker read and write kernel-mode memory.",
148246148242
"references": [
148247-
"CVE-2021-1732",
148248-
"URL-https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/",
148249-
"URL-https://github.com/KaLendsi/CVE-2021-1732-Exploit",
148250-
"URL-https://attackerkb.com/assessments/1a332300-7ded-419b-b717-9bf03ca2a14e",
148251-
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1732",
148252-
"URL-https://www.fuzzysecurity.com/tutorials/expDev/22.html",
148253-
"URL-https://www.geoffchappell.com/studies/windows/win32/user32/structs/wnd/index.htm",
148254-
"URL-https://byteraptors.github.io/windows/exploitation/2020/06/03/exploitingcve2019-1458.html",
148255-
"URL-https://www.trendmicro.com/en_us/research/16/l/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild.html"
148243+
"CVE-2021-21551",
148244+
"URL-https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/",
148245+
"URL-https://www.dell.com/support/kbdoc/ro-ro/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability"
148256148246
],
148257148247
"platform": "Windows",
148258148248
"arch": "x64",
@@ -148264,12 +148254,12 @@
148264148254

148265148255
],
148266148256
"targets": [
148267-
"Windows 10 v1803-20H2 x64"
148257+
"Windows x64"
148268148258
],
148269-
"mod_time": "2021-08-27 17:15:33 +0000",
148270-
"path": "/modules/exploits/windows/local/cve_2021_1732_win32k.rb",
148259+
"mod_time": "2021-09-08 21:56:02 +0000",
148260+
"path": "/modules/exploits/windows/local/cve_2021_21551_dbutil_memmove.rb",
148271148261
"is_install_path": true,
148272-
"ref_name": "windows/local/cve_2021_1732_win32k",
148262+
"ref_name": "windows/local/cve_2021_21551_dbutil_memmove",
148273148263
"check": true,
148274148264
"post_auth": false,
148275148265
"default_credential": false,
@@ -148279,35 +148269,38 @@
148279148269
],
148280148270
"Reliability": [
148281148271
"repeatable-session"
148282-
],
148283-
"SideEffects": [
148284-
148285148272
]
148286148273
},
148287148274
"session_types": [
148288148275
"meterpreter"
148289148276
],
148290148277
"needs_cleanup": null
148291148278
},
148292-
"exploit_windows/local/cve_2021_21551_dbutil_memmove": {
148293-
"name": "Dell DBUtil_2_3.sys IOCTL memmove",
148294-
"fullname": "exploit/windows/local/cve_2021_21551_dbutil_memmove",
148279+
"exploit_windows/local/cve_2021_40449": {
148280+
"name": "Win32k NtGdiResetDC Use After Free Local Privilege Elevation",
148281+
"fullname": "exploit/windows/local/cve_2021_40449",
148295148282
"aliases": [
148296148283

148297148284
],
148298148285
"rank": 400,
148299-
"disclosure_date": "2021-05-04",
148286+
"disclosure_date": "2021-10-12",
148300148287
"type": "exploit",
148301148288
"author": [
148302-
"Kasif Dekel",
148303-
"SentinelLabs",
148304-
"Spencer McIntyre"
148289+
"IronHusky",
148290+
"Costin Raiu",
148291+
"Boris Larin",
148292+
"Red Raindrop Team of Qi'anxin Threat Intelligence Center",
148293+
"KaLendsi",
148294+
"ly4k",
148295+
"Grant Willcox"
148305148296
],
148306-
"description": "The DBUtil_2_3.sys driver distributed by Dell exposes an unprotected IOCTL interface that can be abused by\n an attacker read and write kernel-mode memory.",
148297+
"description": "A use after free vulnerability exists in the `NtGdiResetDC()` function of Win32k which can be leveraged by\n an attacker to escalate privileges to those of `NT AUTHORITY\\SYSTEM`. The flaw exists due to the fact\n that this function calls `hdcOpenDCW()`, which performs a user mode callback. During this callback, attackers\n can call the `NtGdiResetDC()` function again with the same handle as before, which will result in the PDC object\n that is referenced by this handle being freed. The attacker can then replace the memory referenced by the handle\n with their own object, before passing execution back to the original `NtGdiResetDC()` call, which will now use the\n attacker's object without appropriate validation. This can then allow the attacker to manipulate the state of the\n kernel and, together with additional exploitation techniques, gain code execution as NT AUTHORITY\\SYSTEM.\n\n This module has been tested to work on Windows 10 x64 RS1 (build 14393) and RS5 (build 17763), however previous versions\n of Windows 10 will likely also work.",
148307148298
"references": [
148308-
"CVE-2021-21551",
148309-
"URL-https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/",
148310-
"URL-https://www.dell.com/support/kbdoc/ro-ro/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability"
148299+
"CVE-2021-40449",
148300+
"URL-https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/",
148301+
"URL-https://mp.weixin.qq.com/s/AcFS0Yn9SDuYxFnzbBqhkQ",
148302+
"URL-https://github.com/KaLendsi/CVE-2021-40449-Exploit",
148303+
"URL-https://github.com/ly4k/CallbackHell"
148311148304
],
148312148305
"platform": "Windows",
148313148306
"arch": "x64",
@@ -148319,12 +148312,12 @@
148319148312

148320148313
],
148321148314
"targets": [
148322-
"Windows x64"
148315+
"Windows 10 x64 RS1 (build 14393) and RS5 (build 17763)"
148323148316
],
148324-
"mod_time": "2021-09-08 21:56:02 +0000",
148325-
"path": "/modules/exploits/windows/local/cve_2021_21551_dbutil_memmove.rb",
148317+
"mod_time": "2021-11-08 16:12:20 +0000",
148318+
"path": "/modules/exploits/windows/local/cve_2021_40449.rb",
148326148319
"is_install_path": true,
148327-
"ref_name": "windows/local/cve_2021_21551_dbutil_memmove",
148320+
"ref_name": "windows/local/cve_2021_40449",
148328148321
"check": true,
148329148322
"post_auth": false,
148330148323
"default_credential": false,
@@ -148334,38 +148327,49 @@
148334148327
],
148335148328
"Reliability": [
148336148329
"repeatable-session"
148330+
],
148331+
"SideEffects": [
148332+
148337148333
]
148338148334
},
148339148335
"session_types": [
148340148336
"meterpreter"
148341148337
],
148342148338
"needs_cleanup": null
148343148339
},
148344-
"exploit_windows/local/cve_2021_40449": {
148345-
"name": "Win32k NtGdiResetDC Use After Free Local Privilege Elevation",
148346-
"fullname": "exploit/windows/local/cve_2021_40449",
148340+
"exploit_windows/local/cve_2022_21882_win32k": {
148341+
"name": "Win32k ConsoleControl Offset Confusion",
148342+
"fullname": "exploit/windows/local/cve_2022_21882_win32k",
148347148343
"aliases": [
148348-
148344+
"exploit/windows/local/cve_2021_1732_win32k"
148349148345
],
148350-
"rank": 400,
148351-
"disclosure_date": "2021-10-12",
148346+
"rank": 200,
148347+
"disclosure_date": "2021-02-09",
148352148348
"type": "exploit",
148353148349
"author": [
148354-
"IronHusky",
148355-
"Costin Raiu",
148356-
"Boris Larin",
148357-
"Red Raindrop Team of Qi'anxin Threat Intelligence Center",
148350+
"BITTER APT",
148351+
"JinQuan",
148352+
"MaDongZe",
148353+
"TuXiaoYi",
148354+
"LiHao",
148355+
"L4ys",
148358148356
"KaLendsi",
148359-
"ly4k",
148360-
"Grant Willcox"
148357+
"Spencer McIntyre"
148361148358
],
148362-
"description": "A use after free vulnerability exists in the `NtGdiResetDC()` function of Win32k which can be leveraged by\n an attacker to escalate privileges to those of `NT AUTHORITY\\SYSTEM`. The flaw exists due to the fact\n that this function calls `hdcOpenDCW()`, which performs a user mode callback. During this callback, attackers\n can call the `NtGdiResetDC()` function again with the same handle as before, which will result in the PDC object\n that is referenced by this handle being freed. The attacker can then replace the memory referenced by the handle\n with their own object, before passing execution back to the original `NtGdiResetDC()` call, which will now use the\n attacker's object without appropriate validation. This can then allow the attacker to manipulate the state of the\n kernel and, together with additional exploitation techniques, gain code execution as NT AUTHORITY\\SYSTEM.\n\n This module has been tested to work on Windows 10 x64 RS1 (build 14393) and RS5 (build 17763), however previous versions\n of Windows 10 will likely also work.",
148359+
"description": "A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of\n NT AUTHORITY\\SYSTEM. The flaw exists in how the WndExtra field of a window can be manipulated into being\n treated as an offset despite being populated by an attacker-controlled value. This can be leveraged to\n achieve an out of bounds write operation, eventually leading to privilege escalation.\n\n This flaw was originally identified as CVE-2021-1732 and was patched by Microsoft on February 9th, 2021.\n In early 2022, a technique to bypass the patch was identified and assigned CVE-2022-21882. The root cause is\n is the same for both vulnerabilities. This exploit combines the patch bypass with the original exploit to\n function on a wider range of Windows 10 targets.",
148363148360
"references": [
148364-
"CVE-2021-40449",
148365-
"URL-https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/",
148366-
"URL-https://mp.weixin.qq.com/s/AcFS0Yn9SDuYxFnzbBqhkQ",
148367-
"URL-https://github.com/KaLendsi/CVE-2021-40449-Exploit",
148368-
"URL-https://github.com/ly4k/CallbackHell"
148361+
"CVE-2021-1732",
148362+
"URL-https://ti.dbappsecurity.com.cn/blog/index.php/2021/02/10/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack/",
148363+
"URL-https://github.com/KaLendsi/CVE-2021-1732-Exploit",
148364+
"URL-https://attackerkb.com/assessments/1a332300-7ded-419b-b717-9bf03ca2a14e",
148365+
"URL-https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1732",
148366+
"URL-https://www.fuzzysecurity.com/tutorials/expDev/22.html",
148367+
"URL-https://www.geoffchappell.com/studies/windows/win32/user32/structs/wnd/index.htm",
148368+
"URL-https://byteraptors.github.io/windows/exploitation/2020/06/03/exploitingcve2019-1458.html",
148369+
"URL-https://www.trendmicro.com/en_us/research/16/l/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild.html",
148370+
"CVE-2022-21882",
148371+
"URL-https://github.com/L4ys/CVE-2022-21882",
148372+
"URL-https://github.com/KaLendsi/CVE-2022-21882"
148369148373
],
148370148374
"platform": "Windows",
148371148375
"arch": "x64",
@@ -148377,12 +148381,12 @@
148377148381

148378148382
],
148379148383
"targets": [
148380-
"Windows 10 x64 RS1 (build 14393) and RS5 (build 17763)"
148384+
"Windows 10 v1803-21H2 x64"
148381148385
],
148382-
"mod_time": "2021-11-08 16:12:20 +0000",
148383-
"path": "/modules/exploits/windows/local/cve_2021_40449.rb",
148386+
"mod_time": "2022-02-24 11:24:20 +0000",
148387+
"path": "/modules/exploits/windows/local/cve_2022_21882_win32k.rb",
148384148388
"is_install_path": true,
148385-
"ref_name": "windows/local/cve_2021_40449",
148389+
"ref_name": "windows/local/cve_2022_21882_win32k",
148386148390
"check": true,
148387148391
"post_auth": false,
148388148392
"default_credential": false,

0 commit comments

Comments
 (0)