WSRESET UAC BYPASS

WSReset is used to reset Windows Store settings. This executable is signed by Microsoft and has “autoElevate” property set to true in the manifest.

This executable is vulnerable to class hijacking, it can be used to spawn our executable with High IL. We need to hijack the default value at “HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command” with full path to our executable and create a new string value with the name DelegateExecute set to 0.

_config.yml

Once we created all the registry keys and values we can run WSReset executable in order to trigger the UAC bypass. WSReset has to finish loading, can take a few seconds before the high IL process is created.

_config.yml

Tested on Windows 10 (17134)

Full code at WinPwnage project:

https://github.com/rootm0s/WinPwnage/blob/master/winpwnage/functions/uac/uacMethod14.py

WinPwnage usage:

python winpwnage.py --use uac --id 14 --payload c:\\windows\\system32\\cmd.exe

Written on June 23, 2019