CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege# CVE-2020-0683
Original Poc sent to MSRC.
Assigned to CVE-2020-0683 - Windows Installer Elevation of Privilege
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0683
Source code for Visual Studio C++ 2017
Please read the PDF that describes all the findings and steps to reproduce.
Inside "bin_MsiExploit" you'll find the exploit (exe) to execute.
DEMO

---
 [Buy me a beer if you like ;-)](https://www.buymeacoffee.com/padovah4ck)
[4.0K] /data/pocs/d6f7bbd69abc68132233485a99eaa262487f16cf
├── [4.0K] bin_MsiExploit
│ ├── [184K] foo.msi
│ └── [168K] MsiExploit.exe
├── [2.2M] msi_eop.gif
├── [719K] MSI_EoP_New.pdf
├── [ 587] README.md
├── [ 234] readme_run_exploit.txt
└── [4.0K] src_MsiExploit
├── [4.0K] MsiExploit
│ ├── [4.2K] CommonUtils.cpp
│ ├── [1.2K] CommonUtils.h
│ ├── [4.9K] FileOpLock.cpp
│ ├── [ 805] FileOpLock.h
│ ├── [184K] foo.msi
│ ├── [8.7K] MsiExploit.cpp
│ ├── [2.0K] MsiExploit.filters
│ ├── [ 463] MsiExploit.user
│ ├── [8.8K] MsiExploit.vcxproj
│ ├── [ 463] MsiExploit.vcxproj.user
│ ├── [2.8K] ntimports.h
│ ├── [ 165] readfile.user
│ ├── [ 13K] ReparsePoint.cpp
│ ├── [1.2K] ReparsePoint.h
│ ├── [ 814] runExploit.bat
│ ├── [1.8K] ScopedHandle.cpp
│ ├── [ 498] ScopedHandle.h
│ ├── [ 304] stdafx.cpp
│ ├── [ 365] stdafx.h
│ ├── [ 314] targetver.h
│ └── [1.3K] typed_buffer.h
├── [1.4K] MsiExploit.sln
└── [4.0K] x64
├── [4.0K] Debug
│ ├── [184K] foo.msi
│ └── [218K] MsiExploit.exe
└── [4.0K] Release
└── [184K] foo.msi
6 directories, 31 files