Metasploit-framework: AppXSvc CVE-2019-0841 adjustments

Created on 15 Aug 2019  路  3Comments  路  Source: rapid7/metasploit-framework

exploit/windows/local/appxsvc_hard_link_privesc

line 73:
cmd_exec("cmd.exe /c start /min microsoft-edge:", nil, 30)

^ Windows 10 1809 is not accepting /min command, causing error to finish the exploit.

diaghub executable is not accepting args, file used to load dll is hard coded. license.rtf also my ISO(18009 VLSC) does't seems to have license.rtf in System32

Expected behavior

get system shell

Current behavior

access denied.

OS

Kali up-to-date

Framework Version: 5.0.20-dev

Stale bug module

Most helpful comment

Any chance you can send us a pull request? :)

All 3 comments

Any chance you can send us a pull request? :)

Hi!

This issue has been left open with no activity for a while now.

We get a lot of issues, so we currently close issues after 60 days of inactivity. It鈥檚 been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

Hi again!

It鈥檚 been 60 days since anything happened on this issue, so we are going to close it.
Please keep in mind that I鈥檓 only a robot, so if I鈥檝e closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.

As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.

Was this page helpful?
0 / 5 - 0 ratings