Weaponizing to get NT AUTHORITY\SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting
Short Description:
I've discovered comctl32.dll (which is missing in system dir which doesn't really exist) has been loaded by wermgr.exe via windows error reporting by running schtasks. It means if we can create a folder name as C:\windows\system32\wermgr.exe.local with Full permission ACL, we can hijack the comctl32.dll in that folders. Then, I created this poc as a Directory creation to NT AUTHORITY\SYSTEM shell method.
POC video
POC.wmv (with backblaze's directory creation bug)
Remark: I've already reported to backblaze and they replied me that it's know issues. So, I made a video poc for educational purpose of this dircreate2system poc.
For testing purposes:
(if you have a directory creation bug via service vulnerabilities, you don't need administrator access)
- As an administrator, create directory
wermgr.exe.local
inC:\Windows\System32\
- And then, give it access control
cacls C:\Windows\System32\wermgr.exe.local /e /g everyone:f
- Place
spawn.dll
file anddircreate2system.exe
in a same directory. - Then, run
dircreate2system.exe
. - Enjoy a shell as NT AUTHORITY\SYSTEM.
Note:
You can also use another methods by viewing this dir_create2system.txt