0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Hola VPN 1.34 Privilege Escalation Vulnerability
Document Title: =============== Hola VPN v1.34 - Privilege Escalation Vulnerability Vulnerability Class: ==================== Privilege Escalation Product & Service Introduction: =============================== Hola's goal is to make the internet faster, more open, and cheaper to operate. Hola is a collaborative (P2P) internet -- Hola works by sharing the idle resources of its users for the benefit of all. Hola provides several products based on this resource sharing technology: Hola's VPN network allows consumers to browse the web privately, securely, and freely. Making the world wide web worldwide again. Hola is used by over 80 million people! Luminati has disrupted the way businesses conduct brand monitoring (checking the prices of their products in various stores), self-test (checking how their corporate site looks from multiple countries), anti ad-fraud and so on, by providing them a privacy network. Hola's Video CDN changes the game in video delivery. Designed as a service for video publishers, HolaCDN makes videos start faster, buffer less, and at a fraction of the costs of traditional businesses. (Copy of the Vendor Homepage: http://hola.org/faq#intro-howfree ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered an privilege escalation vulnerability in the official Hola VPN v1.34 client software. Vulnerability Disclosure Timeline: ================================== 2016-05-03: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Hola Networks Ltd Product: Hola - VPN Software (Windows) 1.34 Exploitation Technique: ======================= Local Severity Level: =============== Medium Technical Details & Description: ================================ A local privilege escalation vulnerability has been discovered in the official Hola VPN v1.34 client software. The local security vulnerability allows an attackers to gain higher access privileges by exploitation of an insecure permission misconfiguration. The software suffers from a local privilege escalation vulnerability. Users are able to change the files with executable access to a binary of choice. The issue is located in the misconfigured permission values with the `F`(full) flag in the users and everyone group. The group/user permission for the path is assigned to the everyone group. Local attackers could exploit the vulnerability by a replace of the `7za.exe` or `hola.exe`...etc files with a malicious executable file. The malicious file is exectuable with the local system user permissions. The security risk of the vulnerability is estimated as medium (CVSS 3.2). Exploitation of the software vulnerability requires a low privilege system user account with restricted access and without user interaction. Successful exploitation of the vulnerability results in system process compromise and further manipulation or exploitation to compromise the local computer operating system. Proof of Concept (PoC): ======================= The local privilege escalation vulnerability can be exploited by local attackers without user interaction and with system user account. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. --- Session Logs (Privileges) --- C:Program FilesHolaapp Everyone:F C:Program FilesHoladb Everyone:F C:Program FilesHolahola_svc.exe.cid Everyone:F C:Program FilesHolahola_updater.exe.cid Everyone:F C:Program FilesHolalog Everyone:F C:Program FilesHolatemp Everyone:F C:Program FilesHola Medium Mandatory Level (Default) [No-Write-Up] RW Everyone FILE_ALL_ACCESS RW NT SERVICETrustedInstaller FILE_ALL_ACCESS RW NT AUTHORITYSYSTEM FILE_ALL_ACCESS RW BUILTINAdministrators FILE_ALL_ACCESS R BUILTINUsers FILE_LIST_DIRECTORY FILE_READ_ATTRIBUTES FILE_READ_EA FILE_TRAVERSE SYNCHRONIZE READ_CONTROL C:Program FilesHola Everyone:F NT SERVICETrustedInstaller:(ID)F NT SERVICETrustedInstaller:(CI)(IO)(ID)F NT AUTHORITYSYSTEM:(ID)F NT AUTHORITYSYSTEM:(OI)(CI)(IO)(ID)F BUILTINAdministrators:(ID)F BUILTINAdministrators:(OI)(CI)(IO)(ID)F BUILTINUsers:(ID)R BUILTINUsers:(OI)(CI)(IO)(ID)(special access:) GENERIC_READ GENERIC_EXECUTE CREATOR OWNER:(OI)(CI)(IO)(ID)F 7za.exe Everyone:(F) NT AUTHORITYSYSTEM:(I)(F) BUILTINAdministrators:(I)(F) BUILTINUsers:(I)(RX) hola.exe Everyone:(F) NT AUTHORITYSYSTEM:(I)(F) BUILTINAdministrators:(I)(F) BUILTINUsers:(I)(RX) hola_setup.exe NT AUTHORITYSYSTEM:(I)(F) BUILTINAdministrators:(I)(F) BUILTINUsers:(I)(RX) hola_svc.exe Everyone:(F) NT AUTHORITYSYSTEM:(I)(F) BUILTINAdministrators:(I)(F) BUILTINUsers:(I)(RX) hola_updater.exe Everyone:(F) NT AUTHORITYSYSTEM:(I)(F) BUILTINAdministrators:(I)(F) BUILTINUsers:(I)(RX) # 0day.today [2024-11-15] #