Tweet

Conversation

Well this is fun...
Quote Tweet
Hossein NafisiAsl
@MeAsHacker_HNA
·
With #CVE-2022-29072 you can gain SYSTEM privilege in victim system when he has 7zip 😎🥳 github.com/kagancapar/CVE #Windows #PrivilegeEscalation #RedTeam
The media could not be played.
Reload
5
14
85
Hmmm, I think the video might be misleading... I think their argument is that any shell is privilege escalation, because psexec exists???
1
7
Not sure I understand. The privesc binary seemingly creates a malicious 7z file that is then loaded to create the privilege escalation. Where does psexec come into this?
2
3
The psexec is really just the payload they chose to execute. The vulnerability is a heap overflow in 7z that allows arbitrary commands to hh, which has a known privilege escalation. They started as an unpriv user, 7z/hh allowed them to run as admin, psexec got them to system
1
4
I'm skeptical there is any heap overflow, I think it might just be some html with a 7z extension for some reason?
3
9
Like, how would a heap overflow in 7-zip only be reachable via the help viewer? I really think this is just a confused mess of jargon, and behind the scenes it's just WScript.shell + psexec, I'm not sure that's a vulnerability.
2
2
17
I asked them, but their explanation doesn't make much sense. I think I'm confident this CVE is going to be withdrawn.
Quote Tweet
Kağan
@kagancapar
·
Replying to @taviso @jonasLyk and @MeAsHacker_HNA
No, there is a heap overflow here. Let me explain here that the command execution process takes place over the CHM file after a buffer overflow. The mistake 7-zip made here is that it calls the small process that occurs after calling the API ++
3
3
16
What is the part that doesn't make sense, are you an authority? I don't care if the CVE is withdrawn. It doesn't matter if you find this situation unreasonable. It's of no use to me. I don't need to prove myself to anyone. Respects.
2
I think you're mistaken that this is a vulnerability, you do need to prove it's legitimate if you want it fixed. It doesn't make sense because if there *was* a heap overflow, then why wouldn't the same bug be exploitable via CreateRemoteThread()?
1
1
I am not dealing with the problem. I'm looking at how I use it. Technically speaking, I'm not responding to any of my answers because you're not open-minded. If you want to talk a lot, kagancapar@gmail.com. Send your questions to this address and I'll answer when I'm available.
1
Show more replies

New to Twitter?

Sign up now to get your own personalized timeline!
Sign up with Apple
Sign up with phone or email
By signing up, you agree to the Terms of Service and Privacy Policy, including Cookie Use.

Trending now

What’s happening

News
LIVE
奈良県警本部長が謝罪「警備に問題、否定できない」
Politics · Trending
統一教会
187K Tweets
Trending in Japan
コナンのOP
2,532 Tweets
時事メディカル
July 7, 2022
新時代に入ったHIV感染症治療~予後が飛躍的改善、新たな課題も~
FNNプライムオンライン
July 7, 2022
中学校部活の「地域・民間移行」への取り組み 教育現場や生徒からも”歓迎”の声