exploit-db-mirror/exploits/windows/local/47897.txt
Offensive Security 83d2726c75 DB: 2020-01-14
14 changes to exploits/shellcodes

SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)
SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)
Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)
Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)
TaskCanvas 1.4.0 - 'Registration' Denial Of Service
Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC)
Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions
Allok Video Converter 4.6.1217 - Stack Overflow (SEH)
Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)
Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass)
Chevereto 3.13.4 Core - Remote Code Execution
Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit)
Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
2020-01-14 05:02:00 +00:00

35 lines
No EOL
1.2 KiB
Text

# Exploit Title: TotalAV 2020 4.14.31 - Privilege Escalation
# Date: 2020-01-09
# Exploit Author: Kusol Watchara-Apanukorn
# Vendor Homepage: https://www.totalav.com/
# Version: 4.14.31
# Fixed on: 5.3.35
# Tested on: Windows 10 x64
# CVE : CVE-2019-18194
# Vulnerability Description:
# TotalAV 2020 4.14.31 has quarantine flaw that allows attacker escape of
# privilege by using NTFS directory junction.
**You can download vulnerability version with this link:
https://install.protected.net/windows/cdn3/4.14.31/TotalAV_Setup.exe
///////////////////////////////////
Proof of Concept
//////////////////////////////////
1. Plant the malicious file in this case we use DLL file
2. To exploit the vulnerability antivirus must detect the malicious dll
3. Move it to quarantine.
4. Attacker must create NTFS directory junction to restore
Full step: https://www.youtube.com/watch?v=88qeaLq98Gc
Vulnerability Disclosure Timeline:
==================================
17 Oct, 19 : Found Vulnerability
18 Oct, 19 : Vendor Notification
18 Oct, 19 : Request CVE
21 Oct, 19 : Vendor Response
mid Dec, 19 : Vendor released new patched (v5.3.35)
09 Jan, 20: Vulnerability Disclosure