IObit Uninstaller 10 Pro – Unquoted Service Path

  • 作者: Mayur Parmar
    日期: 2021-01-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49371/
  • # Exploit Title: IObit Uninstaller 10 Pro - Unquoted Service Path
    # Date: 2020–12–24
    # Exploit Author: Mayur Parmar(th3cyb3rc0p)
    # Vendor Homepage: https://www.iobit.com
    # Software Link: https://www.iobit.com/en/advanceduninstaller.php
    # Version: 10
    # Tested on Windows 10
    
    Unquoted Service Path:
    When a service is created whose executable path contains spaces and isn’t enclosed within quotes, leads to a vulnerability known as Unquoted Service Path which allows a user to gain SYSTEM privileges (only if the vulnerable service is running with SYSTEM privilege level which most of the time it is).
    In Windows, if the service is not enclosed within quotes and is having spaces, it would handle the space as a break and pass the rest of the service path as an argument.
    
    Attack Vector:
    A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.
    
    Steps to reproduce:
    
    C:\Windows\system32>sc qc IObitUnSvr
    [SC] QueryServiceConfig SUCCESS
    
    SERVICE_NAME: IObitUnSvr
    TYPE : 10WIN32_OWN_PROCESS
    START_TYPE : 2 AUTO_START
    ERROR_CONTROL: 0 IGNORE
    BINARY_PATH_NAME : C:\Program Files (x86)\IObit\IObit Uninstaller\IUService.exe
    LOAD_ORDER_GROUP :
    TAG: 0
    DISPLAY_NAME : IObit Uninstaller Service
    DEPENDENCIES :
    SERVICE_START_NAME : LocalSystem
    
    Mitigation:Ensure that any services that contain a space in the path enclose the path in quotes.
    
    Reference:
    -> https://www.rapid7.com/db/modules/exploit/windows/local/unquoted_service_path/
    -> https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
    -> https://www.hackingarticles.in/windows-privilege-escalation-unquoted-path-service/
    -> https://sec-consult.com/blog/detail/windows-privilege-escalation-an-approach-for-penetration-testers/