[CVE-2024-0311] Exploit SB10418 - Skyhigh Client Proxy Bypass PoC
by global2141 - Thursday October 31, 2024 at 01:47 PM
#1
A recently discovered vulnerability, CVE-2024-0311 (also known as SB10418), allows a malicious insider to bypass the existing policies of the Skyhigh Client Proxy without requiring a valid release code. This PoC highlights an advanced injection technique into SCPBypass.exe, facilitating unauthorized access through SCPService.exe via an exploitable pipe mechanism.

Vulnerability Summary:
The PoC demonstrates how a malicious insider could leverage an RW-accessible pipe, \\.\pipe\MCPTrayPipe0, managed by SCPService.exe. Though this pipe is RW-accessible by default, access control checks performed by WGUARDNT limit writing to authorized processes. The bypass is achieved by injecting into a user-ran instance of SCPBypass.exe, satisfying the check and allowing unauthorized data to be written to the service pipe.

Technical Breakdown

The injection mechanism circumvents Trellix/McAfee LoadLibrary protections by executing shellcode directly on the pipe using WriteFile. This shellcode is designed to bypass common AV and EDR hooks that typically block unauthorized LoadLibrary calls.
Key elements:
  • Injection Target: SCPBypass.exe process.
  • Vulnerable Pipe: \\.\pipe\MCPTrayPipe0.
  • AV/EDR Bypass: Custom shellcode bypasses McAfee hooks on LoadLibrary.
 
Github Link:
Hidden Content
You must register or login to view this content.

Reply
#2
good profile photograph nigger
Reply
#3
(10-31-2024, 01:48 PM)chrono Wrote: good profile photograph nigger

niggers' heads off Hands Up
Reply
#4
Whats good ... PoC please
Reply
#5
lol...thanks for the PoC!
Reply
#6
Thanks, I'm going to check it out
Reply
#7
thanks dude let me see
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching.
Reply
#8
Thanks, I'm going to check it out
Reply
#9
thank you, it was interesting to learn that it was possible
Reply
#10
(10-31-2024, 01:47 PM)global2141 Wrote: A recently discovered vulnerability, CVE-2024-0311 (also known as SB10418), allows a malicious insider to bypass the existing policies of the Skyhigh Client Proxy without requiring a valid release code. This PoC highlights an advanced injection technique into SCPBypass.exe, facilitating unauthorized access through SCPService.exe via an exploitable pipe mechanism.

Vulnerability Summary:
The PoC demonstrates how a malicious insider could leverage an RW-accessible pipe, \\.\pipe\MCPTrayPipe0, managed by SCPService.exe. Though this pipe is RW-accessible by default, access control checks performed by WGUARDNT limit writing to authorized processes. The bypass is achieved by injecting into a user-ran instance of SCPBypass.exe, satisfying the check and allowing unauthorized data to be written to the service pipe.

Technical Breakdown

The injection mechanism circumvents Trellix/McAfee LoadLibrary protections by executing shellcode directly on the pipe using WriteFile. This shellcode is designed to bypass common AV and EDR hooks that typically block unauthorized LoadLibrary calls.
Key elements:
  • Injection Target: SCPBypass.exe process.
  • Vulnerable Pipe: \\.\pipe\MCPTrayPipe0.
  • AV/EDR Bypass: Custom shellcode bypasses McAfee hooks on LoadLibrary.
 
Github Link:

thanks for sharing lil bro
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  AMSI Bypass with Powershell W11 pompompurinn 43 7,907 Today, 02:42 AM
Last Post: v3nuzc0d3r2325
  Exploit Hikvision Camera cctv A3g00n 160 4,516 Today, 02:36 AM
Last Post: v3nuzc0d3r2325
  !Next.js Middleware Bypass (CVE-2025-29927) Rat1337 16 755 08-03-2025, 11:17 AM
Last Post: icebear223
  Exploit Safety-net PoC Inexorable_Baer 2 240 08-02-2025, 08:53 AM
Last Post: Inexorable_Baer
  Apache Superset Authentication Bypass metadata 0 102 08-02-2025, 12:50 AM
Last Post: metadata

Forum Jump:


 Users browsing this thread: 1 Guest(s)