cve/2017/CVE-2017-8565.md

27 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-8565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8565)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20SP2%20and%20R2%20SP1%2C%20Windows%207%20SP1%2C%20Windows%208.1%2C%20Windows%20Server%202012%20Gold%20and%20R2%2C%20Windows%20RT%208.1%2C%20Windows%2010%20Gold%2C%201511%2C%201607%2C%201703%2C%20and%20Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen)
### Description
Windows PowerShell in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability when PSObject wraps a CIM Instance, aka "Windows PowerShell Remote Code Execution Vulnerability".
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Lexus89/ysoserial.net
- https://github.com/NHPT/ysoserial.net
- https://github.com/cyberheartmi9/ysoserial.net
- https://github.com/hktalent/ysoserial.net
- https://github.com/incredibleindishell/ysoserial.net-complied
- https://github.com/puckiestyle/ysoserial.net
- https://github.com/puckiestyle/ysoserial.net-master
- https://github.com/pwntester/ysoserial.net
- https://github.com/revoverflow/ysoserial
- https://github.com/zyanfx/SafeDeserializationHelpers