7.8
CVSSv3

CVE-2020-1337

Published: 17/08/2020 Updated: 21/07/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 10 1709

microsoft windows 10 1803

microsoft windows 10 1809

microsoft windows 10 1903

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows 7 sp1

microsoft windows 8.1 -

microsoft windows rt 8.1 -

microsoft windows server 2008 -

microsoft windows server 2008 r2

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2016 1903

microsoft windows server 2016 1909

microsoft windows server 2016 2004

microsoft windows server 2019 -

Mailing Lists

This exploit leverages a file write vulnerability in the print spooler service which will restart if stopped Because the service cannot be stopped long enough to remove the dll, there is no way to remove the dll once it is loaded by the service Essentially, on default settings, this module adds a permanent elevated backdoor ...
Microsoft Windows suffers from a local spooler bypass vulnerability ...

Github Repositories

poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)

cve-2020-1337-poc poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege) Credit to all researcher who find out this bug Ref: voidseccom/cve-2020-1337-printdemon-is-dead-long-live-printdemon/ code browsed from: githubcom/sailay1996/WerTrigger githubcom/BC-SECURITY/Invoke-PrintDemon @404death

cve-2020-1337-poc poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege) Credit to all researcher who find out this bug Ref: voidseccom/cve-2020-1337-printdemon-is-dead-long-live-printdemon/ code browsed from: githubcom/sailay1996/WerTrigger githubcom/BC-SECURITY/Invoke-PrintDemon @404death

CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch

CVE-2020-1337 CVE-2020-1337 is a bypass of (PrintDemon) CVE-2020-1048’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service The vulnerability does require low privilege access and for the spooler service to restart The patch appeared in Micros

Print Spooler Research Tools The repository contains the tools we developed during our Print Spooler research which we presented in Black Hat USA 2020 and DEF CON 28 Safe Mode ("A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven") Each tool/project contains it's own READMEmd file: SHDWriter: CVE-2020-1048 - Exploit Po

CVE-2020-1048 bypass: binary planting PoC

CVE-2020-1337 - Binary Planting (CVE-2020-1048 bypass) Peleg Hadar (@peleghd) and Tomer Bar at SafeBreach (@safebreach) were acknowledged by Microsoft by the CVE-2020-1048, a Windows Spooler Vulnerability that allows an elevation of privilege on Windows 7 and later Some details were disclosed by Alex Ionescu (@aionescu) and Yarden Shafir (@yarden_shafir) on his cool blog post

CVE-2020-1337 Windows Print Spooler Privilege Escalation

CVE-2020-1337 Windows Privilege Escalation this is a WWW(write-what-where) exploit credit Junyu Zhou (@md5_salt), who told me there could be a new bug Wenxu Wu (@ma7h1as), I find the bug and write this exploit how it works in the patch of CVE-2020-1048, Microsoft add the validation code of portname on XcvData function which could be triggered by call Add-Printer in Powershel

Sibyl-GPT Alert Parsing Script This script connects to the ElasticSearch Detection Engine API, retrieves alerts, allows users to choose one for investigation, and sends the chosen alert to OpenAI to get suggested investigation and remediation Acknowledgments The main inspiration for this work is from Mika's excellent article Requirements An OpenAI API key Python 36 or hi

互联网安全 推荐 ts title url 玄武实验室 推荐 ts title url 20200814 实时检测 4G 伪基站 iblackhatcom/USA-20/Wednesday/us-20-Quintin-Detecting-Fake-4G-Base-Stations-In-Real-Timepdf 20200814 将要发布的 Chome 86 版本将改进地址栏显示 URL 的方式,以防御地址栏欺骗 blogchromiumorg/2020/08/helping-people-

做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips

Intranet Penetration Tips Modified by: z3r0yu Blog: zeroyuxyz PS: 主要增加的内容是自己在做redteam时候的一些技巧 Table of Contents 信息搜集 开源情报信息收集(OSINT) github whois查询/注册人反查/邮箱反查/相关资产 google hacking 创建企业密码字典 字典列表 密码生成 邮箱列表获取 泄露密码查询 对

CVE North Stars Leveraging CVEs as North Stars in vulnerability discovery and comprehension About CVE North Stars Tutorial: cve-north-starsgithubio Blog Post: clearbluejargithubio/posts/cve-north-stars/ CVE North Stars introduces a method to kickstart vulnerability research by taking advantage of the CVE information freely available (ie public blo

做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips

Intranet Penetration CheetSheets Modified by: z3r0yu Blog: zeroyuxyz Table of Contents 信息搜集 开源情报信息收集(OSINT) github whois查询/注册人反查/邮箱反查/相关资产 google hacking 创建企业密码字典 字典列表 密码生成 邮箱列表获取 泄露密码查询 对企业外部相关信息进行搜集 子域名获取

sec-tools 安全工具汇总 engine: Droidefense: Advance Android Malware Analysis Framework react-cool-starter: A starter boilerplate for a universal web app with the best development experience and a focus on performance and best practices howtheysre: A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practi

What's this This project is mainly used to collect the commonly used exp of Windows platform and give the relevant repair scheme On the one hand, it is helpful for security researchers to quickly complete the right raising in the process of penetration testing, on the other hand, it is also helpful for the project party to find the unmatched vulnerability patches accordin

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ASL ASP ASPNET ActionScript Arduino Assembly AutoHotkey Batchfile BitBake Boo C C# C++ CMake CSS Classic ASP CoffeeScript Dart Dockerfile Emacs Lisp Erlang F# Go HCL HTML Haskell Java JavaScript Jupyter Notebook KiCad Kotlin Logos Lua M Makefile Markdown Mask Max Nginx Nim OCaml Objective-C Obj

Windows-exploits 长期收集Windows平台下各类提权漏洞利用工具,目前已收集列表如下。 CVE系列漏洞收集列表 CVE-2003-0352 CVE-2012-0217 CVE-2016-0099 CVE-2019-1132 CVE-2020-16938 CVE-2006-3439 CVE-2013-1332 CVE-2016-3225 CVE-2019-1388 CVE-2021-1732 CVE-2008-1084 CVE-2013-1345 CVE-2016-3371 CVE-2019-1458 CVE-2021-26868 CVE-2008-3464 CVE-2014-1767 CVE

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

公开收集所用

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

What's this This project is mainly used to collect the commonly used exp of Windows platform and give the relevant repair scheme On the one hand, it is helpful for security researchers to quickly complete the right raising in the process of penetration testing, on the other hand, it is also helpful for the project party to find the unmatched vulnerability patches accordin

Windows-exploits CVE系列漏洞收集列表 CVE-2003-0352 CVE-2012-0217 CVE-2016-0099 CVE-2019-1132 CVE-2020-16938 CVE-2006-3439 CVE-2013-1332 CVE-2016-3225 CVE-2019-1388 CVE-2021-1732 CVE-2008-1084 CVE-2013-1345 CVE-2016-3371 CVE-2019-1458 CVE-2021-26868 CVE-2008-3464 CVE-2014-1767 CVE-2016-7255 CVE-2020-0668 CVE-2021-33739 CVE-2008-4037 CVE-2014-4076 CVE-2017-0101 CVE-2020-0

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集合 文章/书籍/教程相关 说明 请善用搜索[Ctrl+F]查找 IOT Device&Mobile

Penetration_Testing_POC 搜集有关渗透测试中用到的POC、脚本、工具、文章等姿势分享,作为笔记吧,欢迎补充。 请注意所有工具是否有后门或者其他异常行为,建议均在虚拟环境操作。 Penetration_Testing_POC 请善用搜索[Ctrl+F]查找 IOT Device&Mobile Phone Web APP 提权辅助相关 PC tools-小工具集

2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总

欢迎关注阿尔法实验室微信公众号 20201231 [漏洞] 2020年增加的10个最严重的CVE blogdetectifycom/2020/12/30/top-10-critical-cves-added-in-2020/ Chromium RawClipboardHostImpl中的UAF漏洞 bugschromiumorg/p/chromium/issues/detail?id=1101509 [工具] Sarenka:OSINT工具,将来自shodan、censys等服务的数据集中在一处

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2021 CVE-2021-1056 (2021-01-07) NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidiako) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure pokerfaceSad/CVE-2021-1056 CVE-2021-

PoC in GitHub 2021 CVE-2021-1056 (2021-01-07) NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidiako) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure pokerfaceSad/CVE-2021-1056 CVE-2021-

PoC in GitHub 2020 CVE-2020-0014 (2020-02-13) It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable This could lead to a local escalation of privilege with no additional execution privileges needed User action is needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Android-10Android

PoC in GitHub 2020 CVE-2020-0014 It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable This could lead to a local escalation of privilege with no additional execution privileges needed User action is needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Android-10Android ID: A-1286745

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr

Recent Articles

PoC Exploit Circulating for Critical Windows Print Spooler Bug
Threatpost • Tara Seals • 30 Jun 2021

UPDATE
A proof-of-concept for a critical Windows security vulnerability that allows remote code execution (RCE) was dropped on GitHub on Tuesday – and while it was taken back down within a few hours, the code was copied and is still out there circulating on the platform.
The bug (CVE-2021-1675) exists in the Windows Print Spooler and has been dubbed “PrintNightmare” by researchers. It was originally addressed in June’s Patch Tuesday updates from Microsoft as a minor elevation...

Unpatched bug in Windows print spooler lets malware run as admin
BleepingComputer • Ionut Ilascu • 06 Aug 2020

Researchers found a way to bypass a patch Microsoft released to address a bug in the Windows printing services, which gives attackers a path to executing malicious code with elevated privileges.
Tracked as CVE-2020-1048, the initial flaw received an initial fix in May and another one is coming with this month’s rollout of security updates from Microsoft.
Discovered and reported responsibly by Peleg Hadar and Tomer Bar of SafeBreach Labs,
affects Windows Print Spooler, the s...