Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Description
Only Hitting PoC [Tested on Windows Server 2008 r2]
Readme

<h2 align="center">CVE-2019-0708</h2>
<h3 align="center">The Crashing Part [BSOD] has been removed intentionally!</h3>

 <p align="center">
<img src="sc.JPG"  />
</p>

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker
connects to the target system using RDP and sends specially crafted requests.  This vulnerability  is pre-authentication  and  requires  no user
interaction.  An attacker who  successfully  exploited this  vulnerability could execute arbitrary code on the  target system. An attacker could
then  install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would  need to send a specially  crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

#### References:
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rdpbcgr
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
- https://github.com/FreeRDP/FreeRDP
- https://github.com/citronneur/rdpy
- https://github.com/rdesktop/rdesktop
- https://github.com/SecureAuthCorp/impacket/

### Usage
``` usage: python3 poc.py -f ips.txt ```


## Contribution, Credits & License
### Ways to contribute

* Suggest a feature
* Report a bug
* Fixing Issues

Licensed under the GNU GPLv3, see LICENSE for more information.
File Snapshot

[4.0K] /data/pocs/e9507049d3466517698fbddd560a776e2d28a25f ├── [ 28K] 0708.py ├── [1.5K] README.md └── [201K] sc.JPG 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →