Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0601 PoC — Microsoft Windows CryptoAPI 信任管理问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows CryptoAPI 信任管理问题漏洞 (CVE-2020-0601)
Description:A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
Description
PoC for CVE-2020-0601 vulnerability (Code Signing)
Readme
# CurveballCertTool (CVE-2020-0601)
This automated bash script for Code Signing was created using this repository: https://github.com/ollypwn/CurveBall  
Please use this script for educational purposes only. 

![Curveball](/img/Curveball.png)

## Requirements
* openssl
* ruby
* osslsigncode

## Usage
`./CurveballCertTool.sh -c`: Create new "legit" certificate  
`./CurveballCertTool.sh -s`: Sign executable

## Example
![CurveballExample](/img/CurveballExample.png)
File Snapshot

[4.0K] /data/pocs/841df6f5923420d55bc9e9d952e485ce0c871e0a ├── [ 493] CreateKey.rb ├── [2.6K] CurveballCertTool.sh ├── [4.0K] img │   ├── [124K] CurveballExample.png │   └── [ 31K] Curveball.png ├── [1.1K] MicrosoftECCProductRootCertificateAuthority.cer └── [ 467] README.md 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →