Пожалуйста, обратите внимание, что пользователь заблокирован
Description vulnerability
PoC
github.com
Description PoCThe vulnerability allows a malicious RDP server to gain write access to any local drive on a computer running a connected RDP client, as long as at least one local drive is accessible through the RDP session.
The trick Abdelhamid used in their POC was, as it so often happens, a symbolic link: Suppose you connected to a malicious RDP server and shared a locally plugged-in USB drive E:, the server could create a symbolic link from E:\temp to C:\ (which would mean your local C: drive, not server's) whereby the entire content of drive C:\ would become accessible to the server under E:\temp with permissions of the connecting user.
PoC
GitHub - klinix5/ReverseRDP_RCE
Contribute to klinix5/ReverseRDP_RCE development by creating an account on GitHub.