Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5752 PoC — Druva inSync Windows Client 路径遍历漏洞

Source
Associated Vulnerability
Title:Druva inSync Windows Client 路径遍历漏洞 (CVE-2020-5752)
Description:Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges.
Description
Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell) RCE
Readme
# CVE-2020-5752: Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-
Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell)

Modified to get Reverse Shell with system privileges.
  
File Snapshot

[4.0K] /data/pocs/967468de82cd635759f947810d410a631517132a ├── [1.5K] DruvaPE.ps1 └── [ 226] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →