DCOMPotato – Local Privalege Escalation Vulnerability
2022-12-9 18:17:26 Author: reconshell.com(查看原文) 阅读量:20 收藏


Some Service DCOM Object and SeImpersonatePrivilege abuse.

Exploit collection for some Service DCOM Object local privalege escalation vulnerability(by SeImpersonatePrivilege abuse)


DCOM use RPC_C_IMP_LEVEL_IDENTIFY as default impersonation level, for the default out-bound IUnknown call, see https://learn.microsoft.com/en-us/windows/win32/com/com-security-defaults. Of course, COM Server can override by call CoInitializeSecurity explicitly.

We known most windows service register their DCOM Server to provide features, Shared Process Service was hosted by svchost, read the default impersonation level from registry.

If we pass a malicious IUnknown object as parameter at some DCOM call, service process will call IRemUnknown::RemQueryInterface/RemRelease/RemAddref on the ProxyObject, now we can got a SecurityImpersonation token by CoImpersonateClient because we are DCOM Server at this time.

Follow was the explicit setting ImpersonationLevel as RPC_C_IMP_LEVEL_IMPERSONATE in default installation:

#after 12r2
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\[email protected]

#2022 only
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\[email protected]

The services are PrinterNotify and McpManagementService, running as SYSTEM.


Note this code was supports x64 and NetFX 4.x only, but you can do a little change for FX2.0/x86 compatibility(IUnknown vtbl hook, see McpManagementPotato).

csc /unsafe PrinterNotifyPotato.cs
csc /unsafe McpManagementPotato.cs


McpManagementPotato/PrinterNotifyPotato <command>

Thanks for UnmarshalPwn!

(and love my cat, Vanilla, can someone make it nekogirl?)

The DCOMPotato is a github repository by zcgonvh

文章来源: https://reconshell.com/dcompotato-local-privalege-escalation-vulnerability/