PrintDemon was a logic vulnerability in the Windows Print Spooler service (spoolsv.exe). The vulnerability was in the way the spooler handled print jobs to files, and when exploited allowed arbitrary writing to the file system as the SYSTEM user.
An example exploit of this vulnerability includes overwriting the PrintConfig.dll in the DriverStore directory, which is then loaded by spoolsv.exe that is running under the SYSTEM user context, when an XPS Print Job is started (as shown in this repository).
Exploiting PrintDemon for Privilege Escalation (CVE-2020-1048). Compiled with VS2022 and tested on Windows 10 x64 version 1909 (build 18363.418)
