• CVE-2020-0674 IE远程代码执行漏洞


    0x00 漏洞描述

      该漏洞影响组件为jscript.dll,该动态链接库是微软Internet Explorer浏览器的Javascript引擎之一,其中IE8及以下使用jscript.dll,IE9及以上默认使用jscript9.dll,但网页可以通过《script》标签指定在IE8兼容性模式下加载jscript.dll,因此IE9、IE10、IE11都受到此漏洞影响。
      从操作系统范围来看,本漏洞影响范围横跨Windows 7至Windows 10中所有的个人操作系统和服务器操作系统。
      该漏洞是一个Use-After-Free漏洞,攻击样本使用UAF达成类型混淆,进而获取全局内存读写能力并绕过ASLR等漏洞利用缓解技术,并从指定ip地址请求下一步攻击载荷,最终达到远程代码执行。

    0x01 影响版本

    产品平台
    Internet Explorer 10 Windows Server 2012
    Internet Explorer 11 Windows 10 Version 1803 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1803 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1803 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1809 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1809 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1809 for ARM64-based Systems
    Internet Explorer 11 Windows Server 2019
    Internet Explorer 11 Windows 10 Version 1909 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1909 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1909 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1709 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1709 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1709 for ARM64-based Systems
    Internet Explorer 11 Windows 10 Version 1903 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1903 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1903 for ARM64-based Systems
    Internet Explorer 11 Windows 10 for 32-bit Systems
    Internet Explorer 11 Windows 10 for x64-based Systems
    Internet Explorer 11 Windows 10 Version 1607 for 32-bit Systems
    Internet Explorer 11 Windows 10 Version 1607 for x64-based Systems
    Internet Explorer 11 Windows Server 2016
    Internet Explorer 11 Windows 7 for 32-bit Systems Service Pack 1
    Internet Explorer 11 Windows 7 for x64-based Systems Service Pack 1
    Internet Explorer 11 Windows 8.1 for 32-bit systems
    Internet Explorer 11 Windows 8.1 for x64-based systems
    Internet Explorer 11 Windows RT 8.1
    Internet Explorer 11 Windows Server 2008 R2 for x64-based Systems Service Pack 1
    Internet Explorer 11 Windows Server 2012
    Internet Explorer 11 Windows Server 2012 R2
    Internet Explorer 9 Windows Server 2008 for 32-bit Systems Service Pack 2
    Internet Explorer 9 Windows Server 2008 for x64-based Systems Service Pack 2

    0x02 漏洞复现

    IE版本:11.900.18362.0

    python:python 3.8

    操作系统:windows 10 专业工作站版

    0x03 编写脚本

    1.编写html CVE-2020-0674.html

    <head>
     
    <meta http-equiv="X-UA-Compatible" content="IE=11"></meta>
     
    <script language="Jscript.Encode">
     
    document.write("jscript.dll says hello.");</script>
    

    2.编写py脚本 CVE-2020-0674.py

    from selenium import webdriver
    ieDriver = "C:Program Files (x86)Internet ExplorerIEDriverServer.exe" 
    browser = webdriver.Ie(ieDriver)
    browser.get('file:///D:My_hacker_tool kilcve-jianceCVE-2020-0674cve-2020-0674.html')   '''这里路径是存放html的路径'''
    

    0x04 复现成功

    0x05 修复意见

    32位系统

    takeown /f %windir%system32jscript.dll
    
    cacls %windir%system32jscript.dll /E /P everyone:N

    64位系统

    takeown /f %windir%syswow64jscript.dll
    
    cacls %windir%syswow64jscript.dll /E /P everyone:N
    
    takeown /f %windir%system32jscript.dll
    
    cacls %windir%system32jscript.dll /E /P everyone:N
    

      


     

  • 相关阅读:
    VS2010引用App_Code下的类文件问题解决方法
    Sql server 2008 sa用户开启教程
    ASP.NET中App_Code,App_Data等文件夹的作用
    错误提示: (provider: Named Pipes Provider, error: 40 Could not open a connection to SQL Server)
    treeview展开一个节点就关闭其他节点
    ASP.NET AJAX Toolkit的安装过程
    c++推荐读物
    for()的多参数
    模板函数I n p u t
    这次真的是下定决心了
  • 原文地址:https://www.cnblogs.com/bflw/p/13297970.html
Copyright © 2020-2023  润新知