[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WinCvs 2.1.1.1 Build 1 Privilege Escalation Vulnerability

Author
hyp3rlinx
Risk
[
Security Risk High
]
0day-ID
0day-ID-26087
Category
local exploits
Date add
25-10-2016
Platform
windows
[+] Credits: John Page aka hyp3rlinx


Vendor:
======================
cvsgui.sourceforge.net
www.wincvs.org


Product:
===========
WinCvs v2.1.1.1 (Build 1)
downloads as wincvs-2.0.2.4
v2.0.2.4


WinCVS is a free app for Windows that will help you simplify the
development of files for groups of people working on
the same software project.


Vulnerability Type:
=====================
Privilege Escalation



CVE Reference:
==============
N/A



Vulnerability Details:
=====================

WinCvs.exe installs a service with an unquoted service path running with
SYSTEM privileges, to exploit a local attacker must place
a malicious executable file named "Program.exe" in the path of the service.
After service restart or system reboot, it could
potentially allow an authorized local user to execute arbitrary code with
elevated privileges on the system.



Proof:
======

C:\Users\hyp3rlinx>sc qc CVS
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: CVS
        TYPE               : 110  WIN32_OWN_PROCESS (interactive)
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : C:\Program Files (x86)\cvsnt\cvsservice.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : CVSNT
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

#  0day.today [2025-01-08]  #