Microsoft Windows PowerShell Code...

- AV AC AU C I A
发布: 2023-12-28
修订: 2024-12-11

Prior work from this researcher disclosed how PowerShell executes unintended files or BASE64 code when processing specially crafted filenames. This research builds on their PSTrojanFile work, adding a PS command line single quote bypass and PS event logging failure. On Windows CL tab, completing a filename uses double quotes that can be leveraged to trigger arbitrary code execution. However, if the filename got wrapped in single quotes it failed, that is until now.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息