Atomic Alarm Clock x86 6.3 – ‘AtomicAlarmClock’ Unquoted Service Path

  • 作者: boku
    日期: 2020-04-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/48352/
  • # Exploit Title: Atomic Alarm Clock x86 6.3 - 'AtomicAlarmClock' Unquoted Service Path
    # Exploit Author: boku
    # Date: 2020-04-17
    # Vendor Homepage: http://www.drive-software.com
    # Software Link: http://www.drive-software.com/download/ataclock.exe
    # Version: 6.3
    # Tested On: Windows 10 Pro 1909 (32-bit)
    # Vulnerability Type: Local Privilege Escalation by unquoted service path owned by 'LocalSystem'.
    
    # Vulnerability Description:
    # The Atomic Alarm Clock service "timeserv.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. 
    # This security misconfiguration by the vendor can be exploited locally or as part of an attack chain. 
    # By placing a file named "Program.exe" on the root drive, an attacker can obtain persistent arbitrary code execution. 
    # Under normal environmental conditions, this exploit ensures escalation of privileges from Admin to SYSTEM.
    
    C:\Users\boku>sc qc AtomicAlarmClock
    [SC] QueryServiceConfig SUCCESS
    
    SERVICE_NAME: AtomicAlarmClock
    TYPE : 10WIN32_OWN_PROCESS
    START_TYPE : 2 AUTO_START
    ERROR_CONTROL: 1 NORMAL
    BINARY_PATH_NAME : C:\Program Files\Atomic Alarm Clock\timeserv.exe
    LOAD_ORDER_GROUP :
    TAG: 0
    DISPLAY_NAME : Atomic Alarm Clock Time
    DEPENDENCIES :
    SERVICE_START_NAME : LocalSystem