exploit-db-mirror/exploits/windows/local/50852.txt
Offensive Security 50cc2edafe DB: 2022-04-08
9 changes to exploits/shellcodes

Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path
binutils 2.37 - Objdump Segmentation Fault
Kramer VIAware - Remote Code Execution (RCE) (Root)
Opmon 9.11 - Cross-site Scripting
Zenario CMS 9.0.54156 - Remote Code Execution (RCE) (Authenticated)
KLiK Social Media Website 1.0 - 'Multiple' SQLi
minewebcms 1.15.2 - Cross-site Scripting (XSS)
qdPM 9.2 - Cross-site Request Forgery (CSRF)
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Deletion
2022-04-08 05:01:37 +00:00

36 lines
No EOL
1.2 KiB
Text

# Exploit Title: Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path
# Exploit Author: Manthan Chhabra (netsectuna), Harshit (fumenoid)
# Version: 2020.2.20328.2050
# Date: 02/04/2022
# Vendor Homepage: http://gimmal.com/
# Vulnerability Type: Unquoted Service Path
# Tested on: Windows 10
# CVE: CVE-2022-23909
# Step to discover Unquoted Service Path:
C:\>wmic service get name,displayname,pathname,startmode | findstr /i
"sherpa" | findstr /i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v
"""
Sherpa Connector Service
Sherpa Connector Service C:\Program
Files\Sherpa Software\Sherpa Connector\SherpaConnectorService.exe
Auto
C:\>sc qc "Sherpa Connector Service"
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: Sherpa Connector Service
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files\Sherpa Software\Sherpa
Connector\SherpaConnectorService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Sherpa Connector Service
DEPENDENCIES : wmiApSrv
SERVICE_START_NAME : LocalSystem