CVE-2019-0708复现

CVE-2019-0708 远程桌面服务的远程代码执行漏洞, 漏洞触发无需用户交互

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Remote Desktop Services Remote Code Execution Vulnerability’. —— CVE


复现环境:

  • Windows 7 (Build 7601, Service Pack 1) x64
  • Windows server 2008 R2 x64
  • Metaspliot (Ubuntu Server)

初始版本的 Exp只适用于64位版本的 Windows 7和 Windows server 2008 R2


更新 MSF到最新(5.0.47)版本,推荐使用 Curl更新(需要删除旧版):

1
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall

因为这个 pull不是正式的,所以需要自行比对 diff增删或者直接替换文件: Pull 地址

这里已下载完成,可直接替换使用(建议去 Pull下载,万一就更新了呢):

1
2
3
4
5
6
# 对应的替换文件

lib/msf/core/exploit/rdp.rb
modules/auxiliary/scanner/rdp/cve_2019_0708_bluekeep.rb
modules/auxiliary/scanner/rdp/rdp_scanner.rb
modules/exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb

000


执行 exploit

000
001
002
003
004