0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
WampServer 3.0.6 - Insecure File Permissions Vulnerability
Technical Details & Description: ================================ Insecure File Permissions vulnerability has been discovered in the official WampServer v3.0.6 software. The vulnerability exists due to insecure default permissions set on the wampmanager.exe and unins000.exe A local attacker could exploit this vulnerability by replacing wampmanager.exe or unins000.exe with a malicious executable file. The malicious file could execute or modify with the LocalSystem permissions. Proof of Concept (PoC): ======================= WampServer for Windows contains a vulnerability that could allow a local attacker to gain elevated privileges. -- PoC Exploit -- C:\wampp>icacls wampmanager.exe wampmanager.exe BUILTIN\Administrateurs:(I)(F) <--- Full Acces AUTORITE NT\Système:(I)(F) BUILTIN\Utilisateurs:(I)(RX) AUTORITE NT\Utilisateurs authentifiés:(I)(M) <--- Modify 1 fichiers correctement traités ; échec du traitement de 0 fichiers C:\wampp>icacls unins000.exe unins000.exe BUILTIN\Administrateurs:(I)(F) <--- Full Acces AUTORITE NT\Système:(I)(F) BUILTIN\Utilisateurs:(I)(RX) AUTORITE NT\Utilisateurs authentifiés:(I)(M) <--- Modify 1 fichiers correctement traités ; échec du traitement de 0 fichiers [+] Disclaimer [+] =================== Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. Domain: www.zwx.fr Contact: msk4@live.fr Social: twitter.com/XSSed.fr Feeds: www.zwx.fr/feed/ Advisory: www.vulnerability-lab.com/show.php?user=ZwX packetstormsecurity.com/files/author/12026/ cxsecurity.com/search/author/DESC/AND/FIND/0/10/ZwX/ 0day.today/author/27461 # 0day.today [2024-11-16] #