CVE-2019-0887
HIGHRemote Desktop Client < 1.2.2691 - Authenticated Remote Code Execution via Clipboard Redirection
Title source: llmExploitation Summary
EIP tracks 2 public exploits for CVE-2019-0887. PoCs published by t43Wiu6, qianshuidewajueji.
AI-analyzed exploit summary This repository contains a functional proof-of-concept exploit for CVE-2019-0887, which leverages DLL hooking to manipulate file operations and clipboard data, demonstrating privilege escalation via a malicious DLL injection technique.
Description
A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an authenticated attacker abuses clipboard redirection, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Exploits (2)
This repository contains a functional proof-of-concept exploit for CVE-2019-0887, which leverages DLL hooking to manipulate file operations and clipboard data, demonstrating privilege escalation via a malicious DLL injection technique.
This repository contains a functional exploit PoC for CVE-2019-0887, which leverages a path traversal vulnerability in Windows to achieve local privilege escalation. The exploit uses DLL injection and API hooking to manipulate file paths and execute arbitrary commands.
References (4)
Scores
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H