module
Print Spooler Remote DLL Injection
| Disclosed | Created |
|---|---|
| N/A | Jul 8, 2021 |
Disclosed
N/A
Created
Jul 8, 2021
Description
The print spooler service can be abused by an authenticated remote attacker to load a DLL through a crafted
DCERPC request, resulting in remote code execution as NT AUTHORITY\SYSTEM. This module uses the MS-RPRN
vector which requires the Print Spooler service to be running.
DCERPC request, resulting in remote code execution as NT AUTHORITY\SYSTEM. This module uses the MS-RPRN
vector which requires the Print Spooler service to be running.
Authors
Zhiniang Peng
Xuefeng Li
Zhipeng Huo
Piotr Madej
Zhang Yunhai
cube0x0
Spencer McIntyre
Christophe De La Fuente
Xuefeng Li
Zhipeng Huo
Piotr Madej
Zhang Yunhai
cube0x0
Spencer McIntyre
Christophe De La Fuente
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.