Windows Escalate Task Scheduler XML Privilege Escalation
This module exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet. When processing task files, the Windows Task Scheduler only uses a CRC32 checksum to validate that the file has not been tampered with. Also, In a default configuration, normal users can read and write the task files that they have created. By modifying the task file and creating a CRC32 collision, an attacker can execute arbitrary commands with SYSTEM privileges. NOTE: Thanks to webDEViL for the information about disable/enable.
- jduck <jduck [at] metasploit.com>
- Windows Vista, 7, and 2008
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/windows/local/ms10_092_schelevator msf exploit(ms10_092_schelevator) > show targets ...targets... msf exploit(ms10_092_schelevator) > set TARGET <target-id> msf exploit(ms10_092_schelevator) > show options ...show and set options... msf exploit(ms10_092_schelevator) > exploit