https://github.com/voidsec/cve-2020-1337
CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch
https://github.com/voidsec/cve-2020-1337
0day cve-2020-1048 cve-2020-1337 exploit faxhell poc printdemon voidsec windows
Last synced: 17 days ago
JSON representation
CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch
- Host: GitHub
- URL: https://github.com/voidsec/cve-2020-1337
- Owner: VoidSec
- Created: 2020-08-11T12:22:56.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-08-11T17:23:04.000Z (over 4 years ago)
- Last Synced: 2025-03-23T22:38:11.839Z (about 1 month ago)
- Topics: 0day, cve-2020-1048, cve-2020-1337, exploit, faxhell, poc, printdemon, voidsec, windows
- Homepage: https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/
- Size: 7.81 KB
- Stars: 14
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2020-1337
**CVE-2020-1337** is a bypass of (PrintDemon) **CVE-2020-1048**’s patch via a Junction Directory, made to remediate an Elevation of Privileges (EoP)\Local Privilege Escalation (LPE) vulnerability affecting the Windows’ Print Spooler Service.
The vulnerability does require low privilege access and for the spooler service to restart.
The patch appeared in Microsoft’s patch Tuesday (11th August 2020) - https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1337#ID0EWIAC.
**Vulnerability description, root cause analysis and PoC code on https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/**