Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-8464 PoC — 多款Microsoft产品访问控制错误漏洞

Source
Associated Vulnerability
Title:多款Microsoft产品访问控制错误漏洞 (CVE-2017-8464)
Description:Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
Description
Support x86 and x64
Readme
# CVE-2017-8464-EXP
Support x86 and x64

Just for test

Lnk file from:
https://github.com/rapid7/metasploit-framework/pull/8767

Thanks to ykoster

Small change,replace the dll file,fix the bug of crashing explorer.exe.(ykoster has fixed this bug)

POC:

x86:

![Alt text](https://raw.githubusercontent.com/3gstudent/CVE-2017-8464-EXP/master/x86.gif)

x64:

![Alt text](https://raw.githubusercontent.com/3gstudent/CVE-2017-8464-EXP/master/x64.gif)

If you can determine the USB drive,one LNK file is enough,like this:

![Alt text](https://raw.githubusercontent.com/3gstudent/CVE-2017-8464-EXP/master/poc1.png)

More details:

https://3gstudent.github.io/Windows-Lnk%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E(CVE-2017-8464)%E5%88%A9%E7%94%A8%E6%B5%8B%E8%AF%95
File Snapshot

[4.0K] /data/pocs/7939cc1b12210baf469f89a9e0f332ab3fda9e91 ├── [4.0K] calc x64 │   ├── [ 240] bzimVhTxVSVAvqWW_H.lnk │   ├── [ 240] CJqsRymyTEMnBoEC_T.lnk │   ├── [ 240] emeDxGEdARUmzHYN_X.lnk │   ├── [ 240] FavqRrpXeqruoJwm_M.lnk │   ├── [ 240] gBsceXqQIqhXHySi_N.lnk │   ├── [ 240] gzTXwmTukBDryAPx_L.lnk │   ├── [ 240] hRAVeKFdQFfUWWqf_D.lnk │   ├── [ 240] joJczkptYQtfkMNm_J.lnk │   ├── [ 240] juHLixrdaEoaGDcL_I.lnk │   ├── [ 240] laTnMsKakEOKsJHf_R.lnk │   ├── [ 240] LdhMQIbWZpcSeVNj_Z.lnk │   ├── [ 240] lvdfRmNKdkMexTNn_G.lnk │   ├── [ 240] NfMIupIogETQsWra_V.lnk │   ├── [ 49K] OuWZjtdbLqFVMSLF.dll │   ├── [ 240] QZwHXICgEbiMtEwe_S.lnk │   ├── [ 240] TeNENqdfbnkTNers_O.lnk │   ├── [ 240] TFjoAQJOJqTTlynz_W.lnk │   ├── [ 240] TpzgiaCNXaSnzlKx_K.lnk │   ├── [ 240] TywZFloXXLcMoUVP_P.lnk │   ├── [ 240] VhfYGmTcCCcrfTaY_Y.lnk │   ├── [ 240] vnvlkoVTAEtCfPYX_Q.lnk │   ├── [ 240] xWiOFoWnpbAxeKSr_U.lnk │   ├── [ 240] YSfBenPxsQHppZuM_E.lnk │   └── [ 240] ZMLUEPWbhtajeFvU_F.lnk ├── [4.0K] calc x86 │   ├── [ 240] AIGrEPvEOTXqjEaw_O.lnk │   ├── [ 240] aQRlCerEgjVIRYLQ_N.lnk │   ├── [ 240] cRTvZQMkUULYLGmW_F.lnk │   ├── [ 240] DNfOzAatoSkUAZpM_E.lnk │   ├── [ 240] FNqWxGJfjXHWtsOf_S.lnk │   ├── [ 240] fXtYTHUBPuuoBWrl_P.lnk │   ├── [ 240] gXRyeJymkCbmiXIR_H.lnk │   ├── [ 240] gyhbcKquCWLSOUSd_U.lnk │   ├── [ 240] iWYfETBuIkffMlgp_Z.lnk │   ├── [ 240] lHGRXkTVRihDzkjl_R.lnk │   ├── [ 240] lPfkoJiWxgsoSrsD_V.lnk │   ├── [ 240] LqFWHUlZTWlULatC_G.lnk │   ├── [ 240] MkGTeIIFLYOjZclX_I.lnk │   ├── [ 240] nChCLwgSBXaEiwIR_Q.lnk │   ├── [ 240] qIeuxAOnUEVJWOEe_K.lnk │   ├── [ 240] QjcZPYwkZKEVQvgs_W.lnk │   ├── [ 240] rxTDIbsrdXcyLvYA_Y.lnk │   ├── [ 240] SAmbRRbbdmzXwBQm_J.lnk │   ├── [ 240] SDtTgoPxAguJyxBw_T.lnk │   ├── [ 240] sHEofvMNSNPGPxnI_X.lnk │   ├── [ 240] uZfBVEFQdlRgsvpT_D.lnk │   ├── [ 240] wDxKJhyBflVPXlwA_L.lnk │   ├── [3.0K] WmOXSshkpQfaLVED.dll │   └── [ 240] xXIRjCUwUvcECnmO_M.lnk ├── [1.5K] LICENSE ├── [ 52K] poc1.png ├── [ 789] README.md ├── [751K] x64.gif └── [750K] x86.gif 2 directories, 53 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →