[CVE-2024-0311] Exploit SB10418 - Skyhigh Client Proxy Bypass PoC
by global2141 - Thursday October 31, 2024 at 01:47 PM
#1
A recently discovered vulnerability, CVE-2024-0311 (also known as SB10418), allows a malicious insider to bypass the existing policies of the Skyhigh Client Proxy without requiring a valid release code. This PoC highlights an advanced injection technique into SCPBypass.exe, facilitating unauthorized access through SCPService.exe via an exploitable pipe mechanism.

Vulnerability Summary:
The PoC demonstrates how a malicious insider could leverage an RW-accessible pipe, \\.\pipe\MCPTrayPipe0, managed by SCPService.exe. Though this pipe is RW-accessible by default, access control checks performed by WGUARDNT limit writing to authorized processes. The bypass is achieved by injecting into a user-ran instance of SCPBypass.exe, satisfying the check and allowing unauthorized data to be written to the service pipe.

Technical Breakdown

The injection mechanism circumvents Trellix/McAfee LoadLibrary protections by executing shellcode directly on the pipe using WriteFile. This shellcode is designed to bypass common AV and EDR hooks that typically block unauthorized LoadLibrary calls.
Key elements:
  • Injection Target: SCPBypass.exe process.
  • Vulnerable Pipe: \\.\pipe\MCPTrayPipe0.
  • AV/EDR Bypass: Custom shellcode bypasses McAfee hooks on LoadLibrary.
 
Github Link:
Hidden Content
You must register or login to view this content.
Reply
#2
good profile photograph nigger
Reply
#3
(Oct 31, 2024, 01:48 PM)chrono Wrote: good profile photograph nigger

niggers' heads off Handsup
Reply
#4
Whats good ... PoC please
Reply
#5
lol...thanks for the PoC!
Reply
#6
Thanks, I'm going to check it out
Reply
#7
thanks dude let me see

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching.
Reply
#8
Thanks, I'm going to check it out
Reply
#9
thank you, it was interesting to learn that it was possible
Reply
#10
(Oct 31, 2024, 01:47 PM)global2141 Wrote: A recently discovered vulnerability, CVE-2024-0311 (also known as SB10418), allows a malicious insider to bypass the existing policies of the Skyhigh Client Proxy without requiring a valid release code. This PoC highlights an advanced injection technique into SCPBypass.exe, facilitating unauthorized access through SCPService.exe via an exploitable pipe mechanism.

Vulnerability Summary:
The PoC demonstrates how a malicious insider could leverage an RW-accessible pipe, \\.\pipe\MCPTrayPipe0, managed by SCPService.exe. Though this pipe is RW-accessible by default, access control checks performed by WGUARDNT limit writing to authorized processes. The bypass is achieved by injecting into a user-ran instance of SCPBypass.exe, satisfying the check and allowing unauthorized data to be written to the service pipe.

Technical Breakdown

The injection mechanism circumvents Trellix/McAfee LoadLibrary protections by executing shellcode directly on the pipe using WriteFile. This shellcode is designed to bypass common AV and EDR hooks that typically block unauthorized LoadLibrary calls.
Key elements:
  • Injection Target: SCPBypass.exe process.
  • Vulnerable Pipe: \\.\pipe\MCPTrayPipe0.
  • AV/EDR Bypass: Custom shellcode bypasses McAfee hooks on LoadLibrary.
 
Github Link:

thanks for sharing lil bro
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New Zer0 Day Wordpress A3g00n 83 4,036 Yesterday, 08:17 PM
Last Post: j4ng0
  {SECRET} DATABASE OF EXPLOITS lulagain 441 28,081 Yesterday, 05:41 PM
Last Post: chiki
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 69 3,702 Yesterday, 03:55 PM
Last Post: fkmonkey
  CVE-2024-32002 RCE PoC HA_twck 2 565 Yesterday, 01:33 PM
Last Post: newxiao1
  Cisco Secure Firewall Management Center(CVE-2026-20131) DirtyEra 0 135 Yesterday, 01:40 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)