Skip to content

talsim/printDemon2system

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

printDemon2system (CVE-2020-1048)

PrintDemon privilege escalation to SYSTEM

PrintDemon was a logic vulnerability in the Windows Print Spooler service (spoolsv.exe). The vulnerability was in the way the spooler handled print jobs to files, and when exploited allowed arbitrary writing to the file system as the SYSTEM user.

An example exploit of this vulnerability includes overwriting the PrintConfig.dll in the DriverStore directory, which is then loaded by spoolsv.exe that is running under the SYSTEM user context, when an XPS Print Job is started (as shown in this repository).

printDemon2system Exploit

Exploiting PrintDemon for Privilege Escalation (CVE-2020-1048). Compiled with VS2022 and tested on Windows 10 x64 version 1909 (build 18363.418)

References

About

PrintDemon (CVE-2020-1048) Privilege Escalation

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published