UACME: UAC bypass via "ms-windows-store://" handler hijack & WSReset.exe trigger
Hello,
I have method https://github.com/AzAgarampur/byeintegrity7-uac/ that is pretty simple and would be nice if it is included. Title of this issue says it all, and it should work from Windows 8 and above. It uses classic UserAssocSet signatures as always, so I’ve only included latest W10 & 8 signatures in them, just like before.
Thanks.
About this issue
- Original URL
- State: closed
- Created 3 years ago
- Comments: 54 (30 by maintainers)
Commits related to this issue
- v 3.5.5 Test version, UserAssocSet signature lookup reworked. Test of possible new WsReset method #97 — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Further work on #97 — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Detect AppXSvc for method 68 (as part of #97) — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Restart AppXSvc if stopped #97 — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Workaround for OpenWith as part of #97 — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Finalization for #97 and readme update. — committed to hfiref0x/UACME by hfiref0x 3 years ago
- v 3.5.5 Method 68 added -> see #97 for more info; Readme updated. — committed to hfiref0x/UACME by hfiref0x 3 years ago
Complete.
I’ve finished testing this method implementation. It works fine on 17763(+LTSC)/18362/18363/19041/19042/19043 and insider preview 213xx builds.
3.5.5 version of uacme will be released tomorrow. Thanks for sharing.
This one looks promising. Will try that method.
Ok I think I found a solution - create an empty
REG_SZnamedNoOpenWithunderHKEY_CURRENT_USER\SOFTWARE\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2.I’ll make standalone test application for this method and post it here.
Well this service is responsible for handling all these fancy new appx crap. By default it is turned off on LTSC. Btw probably no elevation required to launch it.
Probably there is a better solution.
Having this AppXSvc running on LTSC 1809 version triggers exploit ms-windows-store through UserAssocSet exploit and does this immediately.
Edit:
Will check this later on 19042.
That’s already in uacme. There was another method for wsreset before and this behavior is known since then.
I will try to detect Ms Store state however I can’t use most of this fancy API because it brings a lot of unneeded dependencies.
As of “OpenWith” issue it need more tests as it always spawns for me at first run of exploit.
I will look into this issue and post results here as usual. And there will be uacme update because of new shell32 versions.
IMO it only worth if you are using this UserAssocSet somewhere in everyday use program, besides it still will have a switch as this interface has at least two variants with different IID. I will just remake existing signature lookup routines.
Thanks. I’ll look on it and later integrate this if everything goes well. No date yet.