Published on May 7th, 2019 📆 | 1651 Views ⚑
0Microsoft Windows PowerShell Integrated Scripting Environment privilege escalation
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.3 | $0-$5k |
A vulnerability was found in Microsoft Windows (Operating System) and classified as critical. Affected by this issue is a part of the component PowerShell Integrated Scripting Environment. The manipulation with an unknown input leads to a privilege escalation vulnerability. Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.
The weakness was presented 05/01/2019 by John Page as ZDI-CAN-8005 as confirmed advisory (Website). The advisory is available at hyp3rlinx.altervista.org. Local access is required to approach this attack. A single authentication is necessary for exploitation. Technical details are unknown but a public exploit is available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 05/07/2019).
A public exploit has been developed by John Page and been published immediately after the advisory. It is declared as proof-of-concept. The exploit is available at hyp3rlinx.altervista.org. As 0-day the estimated underground price was around $100k and more.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Vendor
Name
VulDB Meta Base Score: 5.3
VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: ?
VulDB Reliability: ?
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
? | ? | ? | ? | ? | ? |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No
Availability: ?
Access: Public
Status: Proof-of-Concept
Author: John Page
Download: ?
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: no mitigation known
Status: ?
0-Day Time: ?
Exploit Delay Time: ?05/01/2019 Advisory disclosed
05/01/2019 Exploit disclosed
05/07/2019 VulDB entry created
05/07/2019 VulDB last updateAdvisory: ZDI-CAN-8005
Researcher: John Page
Status: ConfirmedCreated: 05/07/2019 07:28 AM
Complete: ?
Submitter: hyp3rlinx
Comments
Download it now for free!
https://vuldb.com/?id.134438
No comments yet. Please log in to comment.