File tree Expand file tree Collapse file tree 1 file changed +6
-3
lines changed
modules/exploits/windows/local Expand file tree Collapse file tree 1 file changed +6
-3
lines changed Original file line number Diff line number Diff line change @@ -16,9 +16,9 @@ class Metasploit3 < Msf::Exploit::Local
16
16
17
17
def initialize ( info = { } )
18
18
super ( update_info ( info , {
19
- 'Name' => 'Windows NtApphelpCacheControl Token Impersonation ' ,
19
+ 'Name' => 'Windows NtApphelpCacheControl Improper Authorization Check ' ,
20
20
'Description' => %q{
21
- On Windows 8 , the system call NtApphelpCacheControl (the code is actually in ahcache.sys)
21
+ On Windows, the system call NtApphelpCacheControl (the code is actually in ahcache.sys)
22
22
allows application compatibility data to be cached for quick reuse when new processes are
23
23
created. A normal user can query the cache but cannot add new cached entries as the
24
24
operation is restricted to administrators. This is checked in the function
@@ -30,6 +30,9 @@ def initialize(info={})
30
30
the user SID in the token to LocalSystem's SID. It doesn't check the impersonation level
31
31
of the token so it's possible to get an identify token on your thread from a local system
32
32
process and bypass this check.
33
+
34
+ This module currently only affects Windows 8 and Windows 8.1, and requires access to
35
+ C:\Windows\System\ComputerDefaults.exe (although this can be improved).
33
36
} ,
34
37
'License' => MSF_LICENSE ,
35
38
'Author' =>
@@ -46,7 +49,7 @@ def initialize(info={})
46
49
} ,
47
50
'Targets' =>
48
51
[
49
- [ 'Windows 8' , { } ]
52
+ [ 'Windows 8 / 8.1 ' , { } ]
50
53
] ,
51
54
'Payload' =>
52
55
{
You can’t perform that action at this time.
0 commit comments