bytecode77 / slui-file-handler-hijack-privilege-escalation

Slui File Handler Hijack UAC Bypass Local Privilege Escalation

Home Page:https://bytecode77.com/slui-file-handler-hijack-privilege-escalation

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Slui File Handler Hijack LPE

Exploit Information
Date 15.01.2018
Patched Windows 10 20H1 (19041)
exploit-db 44830
Tested on Windows 8-10, x86/x64 independent

Description

slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking.

Read access to HKCU\Software\Classes\exefile\shell\open is performed upon execution. Due to the registry key being accessible from user mode, an arbitrary executable file can be injected.

This exploit is generally independent from programming language and bitness, as no DLL injection or privileged file copy is needed. In addition, if default system binaries suffice, file drops can be avoided altogether.

Expected Result

When everything worked correctly, a cmd.exe should be spawned with high IL.

Downloads

Compiled binaries:

SluiFileHandlerHijackLPE.zip (ZIP Password: bytecode77)

Project Page

bytecode77.com/slui-file-handler-hijack-privilege-escalation

About

Slui File Handler Hijack UAC Bypass Local Privilege Escalation

https://bytecode77.com/slui-file-handler-hijack-privilege-escalation

License:BSD 2-Clause "Simplified" License


Languages

Language:C++ 100.0%