cve/2021/CVE-2021-42287.md
2024-08-22 18:33:16 +00:00

190 lines
10 KiB
Markdown

### [CVE-2021-42287](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42287)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.4770%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.2300%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19041.1348%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.350%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.0.6003.21282%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.25769%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.25769%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.23517%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.20174%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen)
### Description
Active Directory Domain Services Elevation of Privilege Vulnerability
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/20142995/sectool
- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1
- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AleHelp/Windows-Pentesting-cheatsheet
- https://github.com/Ascotbe/Kernelhub
- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Cruxer8Mech/Idk
- https://github.com/DanielBodnar/my-awesome-stars
- https://github.com/EvilAnne/2021-Read-article
- https://github.com/GhostPack/Rubeus
- https://github.com/GhostTroops/TOP
- https://github.com/Gyarbij/xknow_infosec
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/HackingCost/AD_Pentest
- https://github.com/IAMinZoho/sAMAccountName-Spoofing
- https://github.com/Iveco/xknow_infosec
- https://github.com/JDArmy/GetDomainAdmin
- https://github.com/JERRY123S/all-poc
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/KFriitz/MyRuby
- https://github.com/Kryo1/Pentest_Note
- https://github.com/Ly0nt4r/OSCP
- https://github.com/Mehedi-Babu/active_directory_chtsht
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/OsandaMalith/Rubeus
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Pascal-0x90/Rubeus
- https://github.com/Qazeer/OffensivePythonPipeline
- https://github.com/ReAbout/web-sec
- https://github.com/Ridter/noPac
- https://github.com/RkDx/MyRuby
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/SYRTI/POC_to_review
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Strokekilla/Rubeus
- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/TryA9ain/noPac
- https://github.com/VidyaBipin/Rubeus-CShrp-yara
- https://github.com/WazeHell/sam-the-admin
- https://github.com/Whiteh4tWolf/Attack-Defense
- https://github.com/WhooAmii/POC_to_review
- https://github.com/XiaoliChan/Invoke-sAMSpoofing
- https://github.com/YossiSassi/hAcKtive-Directory-Forensics
- https://github.com/ZyberPatrol/Active-Directory
- https://github.com/angui0O/Awesome-Redteam
- https://github.com/aymankhder/AD-attack-defense
- https://github.com/aymankhder/AD-esploitation-cheatsheet
- https://github.com/aymankhder/Windows-Penetration-Testing
- https://github.com/bhataasim1/AD-Attack-Defence
- https://github.com/blackend/Diario-RedTem
- https://github.com/brimstone/stars
- https://github.com/csb21jb/Pentesting-Notes
- https://github.com/cube0x0/noPac
- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/cyb3rpeace/noPac
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/cybersecurityworks553/noPac-detection
- https://github.com/devmehedi101/bugbounty-CVE-Report
- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/exfilt/CheatSheet
- https://github.com/goddemondemongod/Sec-Interview
- https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense-
- https://github.com/hangchuanin/Intranet_penetration_history
- https://github.com/hegusung/netscan
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/iamramahibrah/AD-Attacks-and-Defend
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/infosecn1nja/AD-Attack-Defense
- https://github.com/jbmihoub/all-poc
- https://github.com/jenriquezv/OSCP-Cheat-Sheets-AD
- https://github.com/joker200-0/Rubeus
- https://github.com/k8gege/Ladon
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/knightswd/NoPacScan
- https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest
- https://github.com/lawbyte/Windows-and-Active-Directory
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/ly4k/Pachine
- https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit
- https://github.com/merlinepedra/RUBEUS
- https://github.com/merlinepedra/RUBEUS-1
- https://github.com/merlinepedra25/RUBEUS
- https://github.com/merlinepedra25/RUBEUS-1
- https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense
- https://github.com/nadeemali79/AD-Attack-Defense
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/open-source-agenda/new-open-source-projects
- https://github.com/oscpname/OSCP_cheat
- https://github.com/paramint/AD-Attack-Defense
- https://github.com/parth45/cheatsheet
- https://github.com/puckiestyle/A-Red-Teamer-diaries
- https://github.com/puckiestyle/sam-the-admin
- https://github.com/pwnlog/PAD
- https://github.com/pwnlog/PuroAD
- https://github.com/pwnlog/PurpAD
- https://github.com/qobil7681/Password-cracker
- https://github.com/retr0-13/AD-Attack-Defense
- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/retr0-13/noPac
- https://github.com/revanmalang/OSCP
- https://github.com/ricardojba/Invoke-noPac
- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG
- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet
- https://github.com/s3mPr1linux/JUST_WALKING_DOG
- https://github.com/safebuffer/sam-the-admin
- https://github.com/santan2020/ck2
- https://github.com/sdogancesur/log4j_github_repository
- https://github.com/securi3ytalent/bugbounty-CVE-Report
- https://github.com/sexyducati/rubeus-test
- https://github.com/shengshengli/GetDomainAdmin
- https://github.com/soosmile/POC
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/suljov/Windows-and-Active-Directory
- https://github.com/suljov/Windwos-and-Active-Directory
- https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet
- https://github.com/syedrizvinet/lib-repos-Rubeus
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/trhacknon/Pocingit
- https://github.com/trhacknon/Rubeus
- https://github.com/tufanturhan/Red-Teamer-Diaries
- https://github.com/tufanturhan/sam-the-admin
- https://github.com/txuswashere/OSCP
- https://github.com/vanhohen/ADNinja
- https://github.com/voker2311/Infra-Security-101
- https://github.com/waterrr/noPac
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yovelo98/OSCP-Cheatsheet
- https://github.com/zecool/cve