Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16784 PoC — Local Privilege Escalation present only on the Windows version of PyInstaller

Source
Associated Vulnerability
Title:Local Privilege Escalation present only on the Windows version of PyInstaller (CVE-2019-16784)
Description:In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
Description
Exploit for PyInstaller CVE-2019-16784
Readme
# PyInstallerPrivEsc
Exploit for PyInstaller CVE-2019-16784

## Article coming soon...
File Snapshot

[4.0K] /data/pocs/8db65afd3bdf579849e1097949fad57e2ef9f7ad ├── [ 485] payload_dll.cpp ├── [3.3K] poc_pyinstaller-cve-2019-16784.cpp ├── [ 87] README.md └── [1.5K] version_dll_proxy.cpp 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →