Skip to content

Commit 1a14916

Browse files
committed
automatic module_metadata_base.json update
1 parent 0bf5244 commit 1a14916

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed

db/modules_metadata_base.json

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176219,6 +176219,62 @@
176219176219

176220176220
]
176221176221
},
176222+
"exploit_windows/local/cve_2024_30088_authz_basep": {
176223+
"name": "Windows Kernel Time of Check Time of Use LPE in AuthzBasepCopyoutInternalSecurityAttributes",
176224+
"fullname": "exploit/windows/local/cve_2024_30088_authz_basep",
176225+
"aliases": [
176226+
176227+
],
176228+
"rank": 600,
176229+
"disclosure_date": "2024-06-11",
176230+
"type": "exploit",
176231+
"author": [
176232+
"tykawaii98",
176233+
"jheysel-r7"
176234+
],
176235+
"description": "CVE-2024-30088 is a Windows Kernel Elevation of Privilege Vulnerability which affects many recent versions of Windows 10,\n Windows 11 and Windows Server 2022.\n\n The vulnerability exists inside the function called `AuthzBasepCopyoutInternalSecurityAttributes` specifically when\n the kernel copies the `_AUTHZBASEP_SECURITY_ATTRIBUTES_INFORMATION` of the current token object to user mode. When the\n kernel preforms the copy of the `SecurityAttributesList`, it sets up the list of the SecurityAttribute's structure\n directly to the user supplied pointed. It then calls `RtlCopyUnicodeString` and\n `AuthzBasepCopyoutInternalSecurityAttributeValues` to copy out the names and values of the `SecurityAttribute` leading\n to multiple Time Of Check Time Of Use (TOCTOU) vulnerabilities in the function.",
176236+
"references": [
176237+
"URL-https://github.com/tykawaii98/CVE-2024-30088",
176238+
"CVE-2024-30038"
176239+
],
176240+
"platform": "Windows",
176241+
"arch": "x64",
176242+
"rport": null,
176243+
"autofilter_ports": [
176244+
176245+
],
176246+
"autofilter_services": [
176247+
176248+
],
176249+
"targets": [
176250+
"Windows x64"
176251+
],
176252+
"mod_time": "2024-09-04 14:09:04 +0000",
176253+
"path": "/modules/exploits/windows/local/cve_2024_30088_authz_basep.rb",
176254+
"is_install_path": true,
176255+
"ref_name": "windows/local/cve_2024_30088_authz_basep",
176256+
"check": true,
176257+
"post_auth": false,
176258+
"default_credential": false,
176259+
"notes": {
176260+
"Stability": [
176261+
"crash-safe"
176262+
],
176263+
"SideEffects": [
176264+
"artifacts-on-disk"
176265+
],
176266+
"Reliability": [
176267+
"unreliable-session"
176268+
]
176269+
},
176270+
"session_types": [
176271+
"meterpreter"
176272+
],
176273+
"needs_cleanup": null,
176274+
"actions": [
176275+
176276+
]
176277+
},
176222176278
"exploit_windows/local/dnsadmin_serverlevelplugindll": {
176223176279
"name": "DnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation",
176224176280
"fullname": "exploit/windows/local/dnsadmin_serverlevelplugindll",

0 commit comments

Comments
 (0)