TotalAV 2020 4.14.31 – Privilege Escalation

  • 作者: Kusol Watchara-Apanukorn
    日期: 2020-01-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47897/
  • # Exploit Title: TotalAV 2020 4.14.31 - Privilege Escalation
    # Date: 2020-01-09
    # Exploit Author: Kusol Watchara-Apanukorn
    # Vendor Homepage: https://www.totalav.com/
    # Version: 4.14.31
    # Fixed on:5.3.35
    # Tested on: Windows 10 x64
    # CVE : CVE-2019-18194
    
    # Vulnerability Description:
    # TotalAV 2020 4.14.31 has quarantine flaw that allows attacker escape of
    # privilege by using NTFS directory junction.
    
    **You can download vulnerability version with this link:
    https://install.protected.net/windows/cdn3/4.14.31/TotalAV_Setup.exe
    
    ///////////////////////////////////
     Proof of Concept
    //////////////////////////////////
    1. Plant the malicious file in this case we use DLL file
    2. To exploit the vulnerability antivirus must detect the malicious dll
    3. Move it to quarantine.
    4. Attacker must create NTFS directory junction to restore
    
    Full step: https://www.youtube.com/watch?v=88qeaLq98Gc
    
    
    Vulnerability Disclosure Timeline:
    ==================================
    17 Oct, 19 : Found Vulnerability
    18 Oct, 19 : Vendor Notification
    18 Oct, 19 : Request CVE
    21 Oct, 19 : Vendor Response
    mid Dec, 19: Vendor released new patched (v5.3.35)
    09 Jan, 20: Vulnerability Disclosure