Windows Escalate UAC Protection...

- AV AC AU C I A
发布: 2019-11-19
修订: 2025-07-26

Microsoft Windows allows for the automatic loading of a profiling COM object during the launch of a CLR process based on certain environment variables ostensibly to monitor execution. In this case, the authors abuse the profiler by pointing to a payload DLL that will be launched as the profiling thread. This thread will run at the permission level of the calling process, so an auto-elevating process will launch the DLL with elevated permissions. In this case, they use gpedit.msc as the auto-elevated CLR process, but others would work, too.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息